WorldWideScience

Sample records for protective security advisors

  1. Knowledge-based computer security advisor

    International Nuclear Information System (INIS)

    Hunteman, W.J.; Squire, M.B.

    1991-01-01

    The rapid expansion of computer security information and technology has included little support to help the security officer identify the safeguards needed to comply with a policy and to secure a computing system. This paper reports that Los Alamos is developing a knowledge-based computer security system to provide expert knowledge to the security officer. This system includes a model for expressing the complex requirements in computer security policy statements. The model is part of an expert system that allows a security officer to describe a computer system and then determine compliance with the policy. The model contains a generic representation that contains network relationships among the policy concepts to support inferencing based on information represented in the generic policy description

  2. Team of Advisors: The Social Science of Advice in Homeland and National Security

    Science.gov (United States)

    2017-03-01

    choice they have to make.”19 While these biases are subconscious and unavoidable, they cannot serve as a crutch to explain away quick, uninformed or...eradicate the influence of biases and heuristics as described by Kahneman, leaders can take steps to reduce the risk of these subconscious influences...hidden bias . Advisors play a role in identifying, recognizing and mitigating the risks inherent to subconsciously relying on heuristics. Third, advisors

  3. 78 FR 66318 - Securities Investor Protection Corporation

    Science.gov (United States)

    2013-11-05

    ...] Securities Investor Protection Corporation AGENCY: Securities and Exchange Commission. ACTION: Proposed rule. SUMMARY: The Securities Investor Protection Corporation (``SIPC'') filed a proposed rule change with the... satisfaction of customer claims for standardized options under the Securities Investor Protection Act of 1970...

  4. Protective force legal issues: the security perspective

    International Nuclear Information System (INIS)

    Rich, B.L.

    1984-01-01

    There has been much discussion and some controversy on the legal issues faced by the Department of Energy's (DOE) protective forces in the performance of their security duties. These include the observance of legal proprieties in the arrest of non-violent demonstrators, the use of lethal weapons, and the extent of protective forces' authority to carry weapons and protect DOE's security interests offsite. In brief, the need to protect DOE's security interests may be in nominal conflict with other requirements. When faced with a potential conflict in requirements, we in the DOE security community must place first attention to the security mission -- to deter and prevent hostile acts

  5. 78 FR 5116 - NASA Information Security Protection

    Science.gov (United States)

    2013-01-24

    ... 2700-AD61 NASA Information Security Protection AGENCY: National Aeronautics and Space Administration..., projects, plans, or protection services relating to the national security; or (h) The development... implement the provisions of Executive Order (E.O.) 13526, Classified National Security Information, and...

  6. Hospital security: "protecting the business".

    Science.gov (United States)

    Maas, Jos

    2013-01-01

    Implementing management science into security isn't hard and is more necessary than ever according to the author who presents and illustrates a five point plan that he says will get the security job done easier and with more commitment from the Board.

  7. The summarize of the technique about proactive network security protection

    International Nuclear Information System (INIS)

    Liu Baoxu; Li Xueying; Cao Aijuan; Yu Chuansong; Xu Rongsheng

    2003-01-01

    The proactive protection measures and the traditional passive security protection tools are complementarities each other. It also can supply the conventional network security protection system and enhance its capability of the security protection. Based upon sorts of existing network security technologies, this article analyses and summarizes the technologies, functions and the development directions of some key proactive network security protection tools. (authors)

  8. Information security protecting the global enterprise

    CERN Document Server

    Pipkin, Donald L

    2000-01-01

    In this book, IT security expert Donald Pipkin addresses every aspect of information security: the business issues, the technical process issues, and the legal issues. Pipkin starts by reviewing the key business issues: estimating the value of information assets, evaluating the cost to the organization if they are lost or disclosed, and determining the appropriate levels of protection and response to security incidents. Next, he walks through the technical processes required to build a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. Finally, Pipkin reviews the legal issues associated with information security, including corporate officers' personal liability for taking care that information is protected. The book's coverage is applicable to businesses of any size, from 50 employees to 50,000 or more, and ideal for everyone who needs at least a basic understanding of information security: network/system administrators, managers, planners, archite...

  9. Infectious disease protection for healthcare security officers.

    Science.gov (United States)

    D'Angelo, Michael S; Arias, Jean

    2015-01-01

    Healthcare Security should be considered an active component in an infectious disease event, the authors maintain, and security officers must be included in an Employee Health screening and N95 fit testing initiative to safely welcome the incoming infected patients. In this article, they spell out the different levels of precautions officers should become familiar with in order to protect themselves.

  10. Quality of protection evaluation of security mechanisms.

    Science.gov (United States)

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol.

  11. Quality of Protection Evaluation of Security Mechanisms

    Science.gov (United States)

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol. PMID:25136683

  12. Critical Infrastructure Protection: Maintenance is National Security

    Directory of Open Access Journals (Sweden)

    Kris Hemme

    2015-10-01

    Full Text Available U.S. critical infrastructure protection (CIP necessitates both the provision of security from internal and external threats and the repair of physically damaged critical infrastructure which may disrupt services. For years, the U.S. infrastructure has been deteriorating, triggering enough damage and loss of life to give cause for major concern. CIP is typically only addressed after a major disaster or catastrophe due to the extreme scrutiny that follows these events. In fact, CIP has been addressed repeatedly since Presidential Decision Directive Sixty-Three (PDD Sixty-Three signed by President Bill Clinton on May Twenty-Second, 1998.[1] This directive highlighted critical infrastructure as “a growing potential vulnerability” and recognized that the United States has to view the U.S. national infrastructure from a security perspective due to its importance to national and economic security. CIP must be addressed in a preventive, rather than reactive, manner.[2] As such, there are sixteen critical infrastructure sectors, each with its own protection plan and unique natural and man-made threats, deteriorations, and risks. A disaster or attack on any one of these critical infrastructures could cause serious damage to national security and possibly lead to the collapse of the entire infrastructure. [1] The White House, Presidential Decision Directive/NSC–63 (Washington D.C.: The White House, May 22, 1998: 1–18, available at: http://www.epa.gov/watersecurity/tools/trainingcd/Guidance/pdd-63.pdf. [2] Ibid, 1.

  13. Personal health record systems and their security protection.

    Science.gov (United States)

    Win, Khin Than; Susilo, Willy; Mu, Yi

    2006-08-01

    The objective of this study is to analyze the security protection of personal health record systems. To achieve this we have investigated different personal health record systems, their security functions, and security issues. We have noted that current security mechanisms are not adequate and we have proposed some security mechanisms to tackle these problems.

  14. Physical protection educational program - information security aspects

    International Nuclear Information System (INIS)

    Tolstoy, A.

    2002-01-01

    Full text: Conceptual approaches for designing an expert training program on object physical protection taking into account information security aspects are examined. A special educational course does not only address the immediate needs for an educational support but also ensures that new professionals include new concepts and knowledge in their practice and encourages current practitioners towards such practice. Features of the modern physical protection systems (PPS) and classification of information circulating at them are pointed out. The requirements to the PPS information protection subsystem are discussed. During the PPS expert training on information security (IS) aspects they should receive certain knowledge, on the basis of which they could competently define and carry out the PPS IS policy for a certain object. Thus, it is important to consider minimally necessary volume of knowledge taught to the PPS experts for independent and competent implementation of the above listed tasks. For the graduate PPS IS expert training it is also necessary to examine the normative and legal acts devoted to IS as a whole and the PPS IS in particular. It is caused by necessity of conformity of methods and information protection tools implemented on a certain object to the federal and departmental IS requirements. The departmental normative IS requirements define an orientation of the PPS expert training. By curriculum development it is necessary to precisely determine for whom the PPS experts are taught. The curriculum should reflect common features of the PPS functioning of the certain object type, i.e. it should be adapted to a certain customer of the experts. The specified features were taken into account by development of an educational course 'Information security of the nuclear facility physical protection systems', taught at the Moscow Engineering Physics Institute (State University) according to the Russian-American educational program 'Master in Physical

  15. Security Clearances and the Protection of National Security Information: Law and Procedures

    National Research Council Canada - National Science Library

    Cohen, Sheldon

    2000-01-01

    ... designed to protect National Security information. The report provides an authoritative compendium for lawyers, security officers and for managers of corporations who must deal with the legal and procedural aspects of security clearances...

  16. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statements that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.

  17. Protecting livelihoods, boosting food security in Kenya | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2015-05-21

    May 21, 2015 ... Protecting livelihoods, boosting food security in Kenya ... America, and the Caribbean with funds from the Government of Canada's fast-start financing. ... Water management and food security in vulnerable regions of China.

  18. Protecting the Privacy and Security of Your Health Information

    Science.gov (United States)

    ... can be used and shared with others. The Security Rule sets rules for how your health information must be kept secure with administrative, technical, and physical safeguards. You may have additional protections and health information rights under your State's laws. ...

  19. Protecting livelihoods, boosting food security in Kenya | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2015-05-21

    May 21, 2015 ... Protecting livelihoods, boosting food security in Kenya ... livestock fodder, with important outcomes for household food security. ... and all counties have since committed funding toward scaling up successful technologies.

  20. CNSS: Interagency Partnering to Protect Our National Security Systems

    National Research Council Canada - National Science Library

    Grimes, John G

    2008-01-01

    .... The CNSS performs the vital function of mobilizing the full, interagency National Security Community for the protection of telecommunications and information systems that support U.S. national security...

  1. Valuing Equal Protection in Aviation Security Screening.

    Science.gov (United States)

    Nguyen, Kenneth D; Rosoff, Heather; John, Richard S

    2017-12-01

    The growing number of anti-terrorism policies has elevated public concerns about discrimination. Within the context of airport security screening, the current study examines how American travelers value the principle of equal protection by quantifying the "equity premium" that they are willing to sacrifice to avoid screening procedures that result in differential treatments. In addition, we applied the notion of procedural justice to explore the effect of alternative selective screening procedures on the value of equal protection. Two-hundred and twenty-two respondents were randomly assigned to one of three selective screening procedures: (1) randomly, (2) using behavioral indicators, or (3) based on demographic characteristics. They were asked to choose between airlines using either an equal or a discriminatory screening procedure. While the former requires all passengers to be screened in the same manner, the latter mandates all passengers undergo a quick primary screening and, in addition, some passengers are selected for a secondary screening based on a predetermined selection criterion. Equity premiums were quantified in terms of monetary cost, wait time, convenience, and safety compromise. Results show that equity premiums varied greatly across respondents, with many indicating little willingness to sacrifice to avoid inequitable screening, and a smaller minority willing to sacrifice anything to avoid the discriminatory screening. The selective screening manipulation was effective in that equity premiums were greater under selection by demographic characteristics compared to the other two procedures. © 2017 Society for Risk Analysis.

  2. Security Management Strategies for Protecting Your Library's Network.

    Science.gov (United States)

    Ives, David J.

    1996-01-01

    Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…

  3. 76 FR 36863 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From...

    Science.gov (United States)

    2011-06-23

    ... Security Protection From Unauthorized External Access AGENCY: Federal Aviation Administration (FAA), DOT... for Gulfstream GVI airplanes. 1. The applicant must ensure electronic system security protection for... that effective electronic system security protection strategies are implemented to protect the airplane...

  4. Security leader insights for information protection lessons and strategies from leading security professionals

    CERN Document Server

    Fahy, Bob

    2014-01-01

    How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Information Protection, a collection of timeless leadership best practices featuring insights from some of the nation's most successful security practitioners, you can. This book can be used as a quick and effective resource to bring your security staff up to speed on security's role in information protection. I

  5. Establishing an Information Security System related to Physical Protection

    International Nuclear Information System (INIS)

    Jang, Sung Soon; Yoo, Ho Sik

    2009-01-01

    A physical protection system (PPS) integrates people, procedures and equipment for the protection of assets or facilities against theft, sabotage or other malevolent attacks. In the physical protection field, it is important the maintain confidentiality of PPS related information, such as the alarm system layout, detailed maps of buildings, and guard schedules. In this abstract, we suggest establishing a methodology for an information security system. The first step in this methodology is to determine the information to protect and possible adversaries. Next, system designers should draw all possible paths to the information and arrange appropriate protection elements. Finally he/she should analyze and upgrade their information security system

  6. Security Measures to Protect Mobile Agents

    Science.gov (United States)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  7. Culture: protection, safety and security connections toward good practices

    International Nuclear Information System (INIS)

    Rozental, Jose Julio

    2005-01-01

    This paper discusses concepts and connections on Protection, Safety and Security, considering many IAEA recent documents and international congress on the subject and basic regulation recommendation to developing countries toward the establishment of adequate capacity to deal with

  8. 76 FR 10529 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From...

    Science.gov (United States)

    2011-02-25

    ... Security Protection From Unauthorized External Access AGENCY: Federal Aviation Administration (FAA), DOT... electronic system security protection for the aircraft control domain and airline information domain from... identified and assessed, and that effective electronic system security protection strategies are implemented...

  9. 75 FR 68370 - Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...

    Science.gov (United States)

    2010-11-05

    ... DEPARTMENT OF HOMELAND SECURITY National Protection and Programs Directorate [Docket No. DHS-2010-0071] Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office...

  10. 78 FR 6807 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-01-31

    ... coordinating and sponsoring an executive-led Critical Infrastructure Protection and Cyber Security mission to... on the cyber security, critical infrastructure protection, and emergency management, ports of entry... security, including border protection, civil defense capabilities, and coast guard and maritime...

  11. 78 FR 5122 - NASA Security and Protective Services Enforcement

    Science.gov (United States)

    2013-01-24

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION 14 CFR Parts 1203a, 1203b, and 1204 [Docket No NASA-2012-0007] RIN 2700-AD89 NASA Security and Protective Services Enforcement AGENCY: National Aeronautics... nonsubstantive changes to NASA regulations to clarify the procedures for establishing controlled/ secure areas...

  12. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    Managers' Council, Radiological Control

    2018-03-12

    This is a shared document required by 10 CFR 835 for all contractors conducting radiological work at the Nevada National Security Site. Please record the Author as "Radiological Control Managers' Council" for consistency with previous RPPs and Rad Con Manuals.

  13. A protect solution for data security in mobile cloud storage

    Science.gov (United States)

    Yu, Xiaojun; Wen, Qiaoyan

    2013-03-01

    It is popular to access the cloud storage by mobile devices. However, this application suffer data security risk, especial the data leakage and privacy violate problem. This risk exists not only in cloud storage system, but also in mobile client platform. To reduce the security risk, this paper proposed a new security solution. It makes full use of the searchable encryption and trusted computing technology. Given the performance limit of the mobile devices, it proposes the trusted proxy based protection architecture. The design basic idea, deploy model and key flows are detailed. The analysis from the security and performance shows the advantage.

  14. Connecting to the Internet Securely; Protecting Home Networks CIAC-2324

    Energy Technology Data Exchange (ETDEWEB)

    Orvis, W J; Krystosek, P; Smith, J

    2002-11-27

    With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does not consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these

  15. Computer Security: transparent monitoring for your protection

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2016-01-01

    Computer security can be handled in one of two ways: in secrecy, behind a black curtain; or out in the open, subject to scrutiny and with full transparency. We believe that the latter is the only right way for CERN, and have always put that belief into practice. In keeping with this spirit, here is a reminder of how we monitor (your) CERN activities in order to guarantee timely responses to computer security incidents.   We monitor all network traffic coming into and going out of CERN. Automatic tools look for suspicious patterns like connections to known malicious IP addresses, web pages or domains. They check for malicious files being downloaded and make statistical analyses of connections in order to identify unusual behaviour. The automatic analysis of the logs from the CERN Domain Name Servers complements this and provides a redundant means of detection. We also constantly scan the CERN office network and keep an inventory of the individual network services running on each device: w...

  16. Radiation Protection, Nuclear Safety and Security

    International Nuclear Information System (INIS)

    Faye, Ndeye Arame Boye; Ndao, Ababacar Sadikhe; Tall, Moustapha Sadibou

    2014-01-01

    Senegal has put in place a regulatory framework which allows to frame legally the use of radioactive sources. A regulatory authority has been established to ensure its application. It is in the process of carrying out its regulatory functions. It cooperates with appropriate national or international institutions operating in fields related to radiation protection, safety and nuclear safety.

  17. 17 CFR 4.14 - Exemption from registration as a commodity trading advisor.

    Science.gov (United States)

    2010-04-01

    ... a commodity trading advisor. 4.14 Section 4.14 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION COMMODITY POOL OPERATORS AND COMMODITY TRADING ADVISORS General Provisions, Definitions and Exemptions § 4.14 Exemption from registration as a commodity trading advisor. This section is...

  18. Radiological protection national system. Basic security rules

    International Nuclear Information System (INIS)

    1981-01-01

    This work has been prepared as the first one of a set of standards and regulations that will be enforced to provide the protection of men and the environment against the undesirable effects of ionizing radiations. It establishes, in the first place, the system of dose limits for the country and the principles of its utilization. It takes into account the CIPR's recommendations in this area and the mentioned frame of reference, it establishes further the necessary restrictions for the application of the limits to the professionally exposed workers, as well as to the isolated members of the public and the population in general. In addition it establishes the general conditions to be met for the implementation of radiological protection, among them, the classification of working areas and working conditions as well as the compulsory periodical medical surveillance. (H.D.N.)

  19. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo [KINAC, Daejeon (Korea, Republic of)

    2013-10-15

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012.

  20. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    International Nuclear Information System (INIS)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo

    2013-01-01

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012

  1. Network Security Hacks Tips & Tools for Protecting Your Privacy

    CERN Document Server

    Lockhart, Andrew

    2009-01-01

    This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending, and incident response.

  2. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Science.gov (United States)

    2010-12-29

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0050] National Protection and Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC...

  3. Annual training manual for security training: Protective force

    Energy Technology Data Exchange (ETDEWEB)

    1990-10-01

    Westinghouse is committed to high quality training relevant to the need of the Protective Forces at the Waste Isolation Pilot Plant (WIPP). The training programs at WIPP are designed to qualify Security personnel to perform WIPP security missions in a professional and responsible manner. The program consists of basic as well as sustainment training, as further described in this plan. This plan documents the WIPP Security training program for security personnel for calendar year 1990. The programs detailed in this plan are designed to adequately train persons to ensure the uninterrupted continuity of Department of Energy (DOE)/Westinghouse operations. The Security Training Program consists of four basic elements. These elements are (1) basic level training; (2) on-the-job training; (3) refresher training; and (4) in-service training.

  4. Security Culture in Physical Protection of Nuclear Material and Facility

    International Nuclear Information System (INIS)

    Susyanta-Widyatmaka; Koraag, Venuesiana-Dewi; Taswanda-Taryo

    2005-01-01

    In nuclear related field, there are three different cultures: safety, safeguards and security culture. Safety culture has established mostly in nuclear industries, meanwhile safeguards and security culture are relatively new and still developing. The latter is intended to improve the physical protection of material and nuclear facility. This paper describes concept, properties and factors affecting security culture and interactions among these cultures. The analysis indicates that anybody involving in nuclear material and facility should have strong commitment and awareness of such culture to establish it. It is concluded that the assessment of security culture outlined in this paper is still preliminary for developing and conduction rigorous security culture implemented in a much more complex facility such as nuclear power plant

  5. Equipment for radiography in Yugoslavia - security and radiation protection

    International Nuclear Information System (INIS)

    Dobrijevic, R.; Vucina, J.

    1998-01-01

    Nondestructive method of material control by using radioisotopes is developed in Yugoslavia. This method of quality control is professionally performed by 30 firms. This paper presents the overview of the equipment used in the industrial radiography by using radioisotopes. Special attention was devoted to the security during the work and to the radiation protection of the operator and other personnel around the working place. In general it could be concluded that the main drawback which influences the security is the fact that most cases old and whom out equipment is in use. Other factors influencing the security are also discussed. (author)

  6. Securing SQL Server Protecting Your Database from Attackers

    CERN Document Server

    Cherry, Denny

    2011-01-01

    There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protec

  7. Securing SQL server protecting your database from attackers

    CERN Document Server

    Cherry, Denny

    2015-01-01

    SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practic

  8. Protecting and securing the energy infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Gillham, B. [Conoco Canada Ltd., Calgary, AB (Canada)

    2002-07-01

    Critical Infrastructure Protection (CIP) includes protection against physical and cyber attacks as well as potential interruptions and vulnerabilities such as natural disasters and human error. CIP makes it possible to deal with the consequences of infrastructure failures that can have regional, national and international impacts. The energy sector is challenged because there has been an irreversible move to automated control systems and electronic transactions. In addition, due to mergers and joint ventures, the line between traditional oil, natural gas companies and power companies is not perfectly clear. Energy industries can no longer be seen in isolation of each other because they depend on other critical infrastructures. Industry should lead CIP programs through risk management assessments, develop and implement global information technology standards, and enhance response and recovery planning. The National Petroleum Council (NPC) will continue to develop the capabilities of the newly formed Information Sharing and Assessment Centre (ISAC). The sector will also continue to develop common vulnerability assessment goals. It was noted that response and recovery plans must include the cyber dimension, because there has been an increasing number of scans and probes from the Internet since the events of September 11, 2001. It was noted that physical incidents can often turn into cyber incidents and vice versa.

  9. Security Techniques for protecting data in Cloud Computing

    OpenAIRE

    Maddineni, Venkata Sravan Kumar; Ragi, Shivashanker

    2012-01-01

    Context: From the past few years, there has been a rapid progress in Cloud Computing. With the increasing number of companies resorting to use resources in the Cloud, there is a necessity for protecting the data of various users using centralized resources. Some major challenges that are being faced by Cloud Computing are to secure, protect and process the data which is the property of the user. Aims and Objectives: The main aim of this research is to understand the security threats and ident...

  10. ICRP Publication 125: Radiological Protection in Security Screening.

    Science.gov (United States)

    Cool, D A; Lazo, E; Tattersall, P; Simeonov, G; Niu, S

    2014-07-01

    The use of technologies to provide security screening for individuals and objects has been increasing rapidly, in keeping with the significant increase in security concerns worldwide. Within the spectrum of technologies, the use of ionizing radiation to provide backscatter and transmission screening capabilities has also increased. The Commission has previously made a number of statements related to the general topic of deliberate exposures of individuals in non-medical settings. This report provides advice on how the radiological protection principles recommended by the Commission should be applied within the context of security screening. More specifically, the principles of justification, optimisation of protection, and dose limitation for planned exposure situations are directly applicable to the use of ionising radiation in security screening. In addition, several specific topics are considered in this report, including the situation in which individuals may be exposed because they are concealed (‘stowaways’) in a cargo container or conveyance that may be subject to screening. The Commission continues to recommend that careful justification of screening should be considered before decisions are made to employ the technology. If a decision is made that its use is justified, the framework for protection as a planned exposure situation should be employed, including optimization of protection with the use of dose constraints and the appropriate provisions for authorisation and inspection.

  11. Security Risks and Protection in Online Learning: A Survey

    Science.gov (United States)

    Chen, Yong; He, Wu

    2013-01-01

    This paper describes a survey of online learning which attempts to determine online learning providers' awareness of potential security risks and the protection measures that will diminish them. The authors use a combination of two methods: blog mining and a traditional literature search. The findings indicate that, while scholars have…

  12. Energy security and climate change protection: Complementarity or tradeoff?

    International Nuclear Information System (INIS)

    Brown, Stephen P.A.; Huntington, Hillard G.

    2008-01-01

    Energy security and climate change protection have risen to the forefront of energy policy - linked in time and a perception that both goals can be achieved through the same or similar policies. Although such complementarity can exist for individual technologies, policymakers face a tradeoff between these two policy objectives. The tradeoff arises when policymakers choose the mix of individual technologies with which to reduce greenhouse gas emissions and enhance energy security. Optimal policy is achieved when the cost of the additional use of each technology equals the value of the additional energy security and reduction in greenhouse gas emission that it provides. Such an approach may draw more heavily on conventional technologies that provide benefits in only one dimension than on more costly technologies that both increase energy security and reduce greenhouse gas emissions. (author)

  13. Education Organization Baseline Control Protection and Trusted Level Security

    Directory of Open Access Journals (Sweden)

    Wasim A. Al-Hamdani

    2007-12-01

    Full Text Available Many education organizations have adopted for security the enterprise best practices for implementation on their campuses, while others focus on ISO Standard (or/and the National Institution of Standards and Technology.All these adoptions are dependent on IT personal and their experiences or knowledge of the standard. On top of this is the size of the education organizations. The larger the population in an education organization, the more the problem of information and security become very clear. Thus, they have been obliged to comply with information security issues and adopt the national or international standard. The case is quite different when the population size of the education organization is smaller. In such education organizations, they use social security numbers as student ID, and issue administrative rights to faculty and lab managers – or they are not aware of the Family Educational Rights and Privacy Act (FERPA – and release some personal information.The problem of education organization security is widely open and depends on the IT staff and their information security knowledge in addition to the education culture (education, scholarships and services has very special characteristics other than an enterprise or comparative organizationThis paper is part of a research to develop an “Education Organization Baseline Control Protection and Trusted Level Security.” The research has three parts: Adopting (standards, Testing and Modifying (if needed.

  14. 75 FR 75711 - Securities Investor Protection Corporation; Notice of Filing of a Proposed Bylaw Change Relating...

    Science.gov (United States)

    2010-12-06

    ... Securities Investor Protection Corporation (``SIPC'') filed with the Securities and Exchange Commission... Members, Rel. No. SIPA-156, 56 FR 51952 (Oct. 16, 1991). \\6\\ Securities Investor Protection Corporation... SECURITIES AND EXCHANGE COMMISSION [Release No. SIPA-169; File No. SIPC-2010-01] Securities...

  15. Securing SQL Server Protecting Your Database from Attackers

    CERN Document Server

    Cherry, Denny

    2012-01-01

    Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names in SQL Server today, Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. In this book, you will learn how to properly secure your database from both internal and external threats using best practices and specific tricks the author uses in his role as an independent consultant while working on some of the largest

  16. Security enhanced BioEncoding for protecting iris codes

    Science.gov (United States)

    Ouda, Osama; Tsumura, Norimichi; Nakaguchi, Toshiya

    2011-06-01

    Improving the security of biometric template protection techniques is a key prerequisite for the widespread deployment of biometric technologies. BioEncoding is a recently proposed template protection scheme, based on the concept of cancelable biometrics, for protecting biometric templates represented as binary strings such as iris codes. The main advantage of BioEncoding over other template protection schemes is that it does not require user-specific keys and/or tokens during verification. Besides, it satisfies all the requirements of the cancelable biometrics construct without deteriorating the matching accuracy. However, although it has been shown that BioEncoding is secure enough against simple brute-force search attacks, the security of BioEncoded templates against more smart attacks, such as record multiplicity attacks, has not been sufficiently investigated. In this paper, a rigorous security analysis of BioEncoding is presented. Firstly, resistance of BioEncoded templates against brute-force attacks is revisited thoroughly. Secondly, we show that although the cancelable transformation employed in BioEncoding might be non-invertible for a single protected template, the original iris code could be inverted by correlating several templates used in different applications but created from the same iris. Accordingly, we propose an important modification to the BioEncoding transformation process in order to hinder attackers from exploiting this type of attacks. The effectiveness of adopting the suggested modification is validated and its impact on the matching accuracy is investigated empirically using CASIA-IrisV3-Interval dataset. Experimental results confirm the efficacy of the proposed approach and show that it preserves the matching accuracy of the unprotected iris recognition system.

  17. WRR-Policy Brief 6 : Big data and security policies: serving security, protecting freedom

    NARCIS (Netherlands)

    Broeders, Dennis; Schrijvers, Erik; Hirsch Ballin, Ernst

    2017-01-01

    Big Data analytics in national security, law enforcement and the fight against fraud can reap great benefits for states, citizens and society but require extra safeguards to protect citizens’ fundamental rights. This requires new frameworks: a crucial shift is necessary from regulating the phase of

  18. Effectively protecting cyber infrastructure and assessing security needs

    Energy Technology Data Exchange (ETDEWEB)

    Robbins, J.; Starman, R. [EWA Canada Ltd., Edmonton, AB (Canada)

    2002-07-01

    This presentation addressed some of the requirements for effectively protecting cyber infrastructure and assessing security needs. The paper discussed the hype regarding cyber attacks, and presented the Canadian reality (as viewed by CanCERT). An assessment of security concerns was also presented. Recent cyber attacks on computer networks have raised fears of unsafe energy networks. Some experts claim the attacks are linked to terrorism, others blame industrial spying and mischief. Others dismiss the notion that somebody could bring down a power grid with a laptop as being far-fetched. It was noted that the cyber security threat is real, and that attacks are becoming more sophisticated as we live in a target rich environment. The issue of assessing vulnerabilities was discussed along with the selection of safeguards such as improving SCADA systems and the latest encryption methods to prevent hackers from bringing down computer networks. 3 tabs., 23 figs.

  19. Protecting Commercial Space Systems: A Critical National Security Issue

    Science.gov (United States)

    1999-04-01

    systems. Part two will describe, at the operational level , this author’s theory for space protection and recommend a course of action to work...minimal loss of life. These factors force us to conclude this is a critical national security issue just as many in high- level government positions...Command and Staff College Operational Forces Coursebook (Academic Year 1999), 35. 3 The USCG is not a Title 10 Service, thus Posse Comitatus is not a

  20. 76 FR 2728 - Securities Investor Protection Corporation; Order Approving a Proposed Bylaw Change Relating to...

    Science.gov (United States)

    2011-01-14

    ... on SIPC Members January 10, 2011. On October 8, 2010, the Securities Investor Protection Corporation... pursuant to Section 3(e)(1) of the Securities Investor Protection Act of 1970 (``SIPA''), 15 U.S.C. 78ccc(e... SECURITIES AND EXCHANGE COMMISSION [Release No. SIPA-170; File No. SIPC-2010-01] Securities...

  1. 17 CFR 403.4 - Customer protection-reserves and custody of securities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Customer protection-reserves... TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 PROTECTION OF CUSTOMER SECURITIES AND BALANCES § 403.4 Customer protection—reserves and custody of securities. Every registered...

  2. 76 FR 75781 - Treasury Inflation-Protected Securities Issued at a Premium

    Science.gov (United States)

    2011-12-05

    ... Inflation-Protected Securities Issued at a Premium AGENCY: Internal Revenue Service (IRS), Treasury. ACTION... tax treatment of Treasury Inflation-Protected Securities issued with more than a de minimis amount of... a toll-free number). SUPPLEMENTARY INFORMATION: Background Treasury Inflation-Protected Securities...

  3. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2013-05-28

    ... 1974; Department of Homeland Security National Protection and Programs Directorate--001 Arrival and... of records titled Department of Homeland Security/National Protection and Programs Directorate--001... of 1974, 5 U.S.C. 552a, the Department of Homeland Security (DHS) National Protection and Programs...

  4. 49 CFR 387.303 - Security for the protection of the public: Minimum limits.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 5 2010-10-01 2010-10-01 false Security for the protection of the public: Minimum... Insurance for Motor Carriers and Property Brokers § 387.303 Security for the protection of the public... convenience of the user, the revised text is set forth as follows: § 387.303 Security for the protection of...

  5. Computer Security: Protect your plant: a "serious game" about control system cyber-security

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Control system cyber-security is attracting increasing attention: from cybercriminals, from the media and from security researchers.   After the legendary “Stuxnet” attacks of 2010 against an Iranian uranium enrichment plant, the infiltration of Saudi Aramco in 2012, and most recently the hacking of German blast furnaces, we should be prepared. Just imagine what would happen if hackers turned off the lights in Geneva and the Pays-de-Gex for a month? (“Hacking control systems, switching lights off!"). Or if attackers infiltrated CERN’s accelerator or experiment control systems and stopped us from pursuing our core business: delivering beams and recording particle collisions (“Hacking control systems, switching... accelerators off?"). Now you can test your ability to protect an industrial plant against cyber-threats! The Computer Security Team, in collaboration with Kaspersky Lab, is organising a so-...

  6. Security for whom? Stabilisation and civilian protection in Colombia.

    Science.gov (United States)

    Elhawary, Samir

    2010-10-01

    This paper focuses on three periods of stabilisation in Colombia: the Alliance for Progress (1961-73) that sought to stem the threat of communist revolution in Latin America; Plan Colombia and President Alvaro Uribe's 'democratic security' policy (2000-07) aimed at defeating the guerrillas and negotiating a settlement with the paramilitaries; and the current 'integrated approach', adopted from 2007, to consolidate more effectively the state's control of its territory.(1) The paper assesses the extent to which these stabilisation efforts have enhanced the protection of civilians and ultimately finds that in all three periods there has been a disconnect between the discourse and the practice of stabilisation. While they have all sought to enhance security, in actual fact, they have privileged the security of the state and its allies at the expense of the effective protection of the civilian population. This has not only led to widespread human rights abuses but also has undermined the long-term stability being pursued. © 2010 The Author(s). Journal compilation © Overseas Development Institute, 2010.

  7. Cyber Security and Habeas Data: The Latin American response to information security and data protection

    Directory of Open Access Journals (Sweden)

    Luisa Parraguez Kobek

    2016-11-01

    Full Text Available Habeas Data is not a commonly known concept, yet it is widely acknowledged in certain circles that deal with information security and data protection. Though it has been around for decades, it has recently gained momentum in Latin America. It is the legal notion that protects any and all information pertaining to the individual, from personal to financial, giving them the power to decide how and where such data can be used. At the same time, most Latin American countries have created laws that protect individuals if their  information is misused. This article examines the concept of Habeas Data from its inception to its current applications, and explains the different approaches and legislations passed in Latin American countries on data protection due to the rise of global cybercrime.

  8. Dissecting the Security and Protection Issues in Pervasive Computing

    Directory of Open Access Journals (Sweden)

    Qaisar Javaid

    2018-04-01

    Full Text Available Human beings reflect nomadic behaviour as they keep on travelling place to place whole day for personal or organizational purposes. The inception of modern networking technologies and the advent of wide range of applications in terms of services and resources have facilitated the users in many ways. The advancements in numerous areas such as embedded systems, WN (Wireless Networks, mobile and context-aware computing, anticipated pervasive computing dominated the human communication at large. Pervasive computing refers to the environment where information is accessible anywhere and anytime while existing system is invisible to the user. On the other hand, the invisibility of pervasive computing is also a problem in its adoption as users are unaware when and what devices collect their personal data and how it is being used. It has caused new security chaos as the more information about user is collected the more privacy and security concerns it raises, thus, the pervasive computing applications became key concern for user. This paper is aimed at analyzing the security and protection issues that arise while traveling from place to place connected with wireless mobile networks. The paper reviews many existing systems that offer possible security to pervasive users. An easy, precise and relative analysis and evaluation of surveyed pervasive systems are presented and some future directions are highlighted.

  9. 78 FR 27444 - Forum Investment Advisors, LLC, et al.;

    Science.gov (United States)

    2013-05-10

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30507; 812-13915] Forum Investment Advisors, LLC, et al.; Notice of Application May 6, 2013. AGENCY: Securities and Exchange Commission (``Commission''). ACTION: Notice of an application for an order under section 6(c) of the...

  10. Energy policy seesaw between security and protecting the environment

    International Nuclear Information System (INIS)

    Finon, D.

    1994-01-01

    It is just the price of oil that causes the energy policies of importing countries to vacillate. Changing perceptions of energy supply factors has had as much to do with transfiguring government action modes since 1973 as has the idea of the legitimacy of that action. The present paper thus draws a parallel between the goal of energy security twenty years ago and that of global environmental protection today, which explains the critical reversion to a view of minimum government action in the energy field - a view that marked the eighties. (author). 20 refs

  11. Model Based Cyber Security Analysis for Research Reactor Protection System

    International Nuclear Information System (INIS)

    Sho, Jinsoo; Rahman, Khalil Ur; Heo, Gyunyoung; Son, Hanseong

    2013-01-01

    The study on the qualitative risk due to cyber-attacks into research reactors was performed using bayesian Network (BN). This was motivated to solve the issues of cyber security raised due to digitalization of instrumentation and control (I and C) system. As a demonstrative example, we chose the reactor protection system (RPS) of research reactors. Two scenarios of cyber-attacks on RPS were analyzed to develop mitigation measures against vulnerabilities. The one is the 'insertion of reactor trip' and the other is the 'scram halt'. The six mitigation measures are developed for five vulnerability for these scenarios by getting the risk information from BN

  12. Security auditing: a prescription for keeping protection programs healthy.

    Science.gov (United States)

    Luizzo, Anthony

    2010-01-01

    The different aspects of security auditing and the role of the security auditor is explained in detail by the author in this primer for security professionals with specific advice on what should be included in a security audit report.

  13. Practical aspects of handling data protection and data security.

    Science.gov (United States)

    Louwerse, C P

    1991-01-01

    Looking at practical applications of health care information systems, we must conclude that in the field of data protection there still is too large a gap between what is feasible and necessary on one hand, and what is achieved in actual realizations on the other. To illustrate this point, we sketch the actual data protection measures in a large hospital information system, and describe the effects of changes affecting the system, such as increasing use of personal computers, and growing intensity of use of the system. Trends in the development of new and additional systems are indicated, and a summary of possible weak points and gaps in the security is given, some suggestions for improvement are made.

  14. Safety review advisor

    International Nuclear Information System (INIS)

    Boshers, J.A.; Uhrig, R.E.; Alguindigue, I.A.; Burnett, C.G.

    1991-01-01

    The University of Tennessee's Nuclear Engineering department, in cooperation with the Tennessee Valley Authority (TVA), is evaluating the feasibility of utilizing an expert system to aid in 10CFR50.59 evaluations. This paper discusses the history of 10CFR50.59 reviews, and details the development approach used in the construction of a prototype Safety Review Advisor (SRA). The goals for this expert system prototype are to aid the engineer in the evaluation process by directing his attention to the appropriate critical issues, increase the efficiency, consistency, and thoroughness of the evaluation process, and provide a foundation of appropriate Safety Analysis Report (SAR) references for the reviewer

  15. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while...

  16. 10 CFR 2.903 - Protection of restricted data and national security information.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or...

  17. SOCIAL CONDITIONALITY OF INFORMATION SECURITY PROTECTION BY CRIMINAL LAW IN THE RUSSIAN FEDERATION

    OpenAIRE

    EFREMOVA MARINA ALEKSANDROVNA

    2016-01-01

    Information security is one of the components of the national security in the Russian Federation. The role of the information component in the national security has become significantly more important. The criminal law needs to be updated in order to enhance its effectiveness with regard to criminal law protection of information security.

  18. 78 FR 39712 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-07-02

    ... DEPARTMENT OF COMMERCE International Trade Administration Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait Clarification and Amendment AGENCY... cyber-security firms and trade organizations which have not already submitted an application are...

  19. 78 FR 666 - Treasury Inflation-Protected Securities Issued at a Premium; Bond Premium Carryforward

    Science.gov (United States)

    2013-01-04

    ...-BL29 Treasury Inflation-Protected Securities Issued at a Premium; Bond Premium Carryforward AGENCY... contains final regulations that provide guidance on the tax treatment of Treasury Inflation-Protected... regulations in this document provide guidance to holders of Treasury Inflation-Protected Securities and other...

  20. Fourier domain asymmetric cryptosystem for privacy protected multimodal biometric security

    Science.gov (United States)

    Choudhury, Debesh

    2016-04-01

    We propose a Fourier domain asymmetric cryptosystem for multimodal biometric security. One modality of biometrics (such as face) is used as the plaintext, which is encrypted by another modality of biometrics (such as fingerprint). A private key is synthesized from the encrypted biometric signature by complex spatial Fourier processing. The encrypted biometric signature is further encrypted by other biometric modalities, and the corresponding private keys are synthesized. The resulting biometric signature is privacy protected since the encryption keys are provided by the human, and hence those are private keys. Moreover, the decryption keys are synthesized using those private encryption keys. The encrypted signatures are decrypted using the synthesized private keys and inverse complex spatial Fourier processing. Computer simulations demonstrate the feasibility of the technique proposed.

  1. Current Trends in providing the Toys Security and Consumer Protection

    Directory of Open Access Journals (Sweden)

    Luiela Magdalena Csorba

    2014-01-01

    Full Text Available The goods and services market is not in equilibrium. This affects continuously the consumers under multiple aspects: economic, educational, health insurance and security, and so on. Not even the toys market outlets or the toys trading market aren’t trouble free. Because publications in the toys consumer protection field are seldom (legislation is the starting point in analyzing this area, the checks carried out at national level which showed the marketed toys insecurity and the abuses of the economic agents in this sector determined us to analyze the degree in which people knows the toy-related injuries and the danger to which they expose their own children when purchasing dangerous toys. That’s why a quantitative research was conducted, using the method of questionnaire, distributed through the Romanian consumers, with the aim to check the empirically awareness and the seriousness with which they relate the risks concerning the toys consume.

  2. Smart responsive phosphorescent materials for data recording and security protection.

    Science.gov (United States)

    Sun, Huibin; Liu, Shujuan; Lin, Wenpeng; Zhang, Kenneth Yin; Lv, Wen; Huang, Xiao; Huo, Fengwei; Yang, Huiran; Jenkins, Gareth; Zhao, Qiang; Huang, Wei

    2014-04-07

    Smart luminescent materials that are responsive to external stimuli have received considerable interest. Here we report ionic iridium (III) complexes simultaneously exhibiting mechanochromic, vapochromic and electrochromic phosphorescence. These complexes share the same phosphorescent iridium (III) cation with a N-H moiety in the N^N ligand and contain different anions, including hexafluorophosphate, tetrafluoroborate, iodide, bromide and chloride. The anionic counterions cause a variation in the emission colours of the complexes from yellow to green by forming hydrogen bonds with the N-H proton. The electronic effect of the N-H moiety is sensitive towards mechanical grinding, solvent vapour and electric field, resulting in mechanochromic, vapochromic and electrochromic phosphorescence. On the basis of these findings, we construct a data-recording device and demonstrate data encryption and decryption via fluorescence lifetime imaging and time-gated luminescence imaging techniques. Our results suggest that rationally designed phosphorescent complexes may be promising candidates for advanced data recording and security protection.

  3. Model Based Cyber Security Analysis for Research Reactor Protection System

    Energy Technology Data Exchange (ETDEWEB)

    Sho, Jinsoo; Rahman, Khalil Ur; Heo, Gyunyoung [Kyung Hee Univ., Yongin (Korea, Republic of); Son, Hanseong [Joongbu Univ., Geumsan (Korea, Republic of)

    2013-07-01

    The study on the qualitative risk due to cyber-attacks into research reactors was performed using bayesian Network (BN). This was motivated to solve the issues of cyber security raised due to digitalization of instrumentation and control (I and C) system. As a demonstrative example, we chose the reactor protection system (RPS) of research reactors. Two scenarios of cyber-attacks on RPS were analyzed to develop mitigation measures against vulnerabilities. The one is the 'insertion of reactor trip' and the other is the 'scram halt'. The six mitigation measures are developed for five vulnerability for these scenarios by getting the risk information from BN.

  4. Safety review advisor

    International Nuclear Information System (INIS)

    Boshers, J.A.; Alguindigue, I.E.; Uhrig, R.E.

    1989-01-01

    The University of Tennessee's Nuclear Engineering Department, in cooperation with the Tennessee Valley Authority (TVA), is evaluating the feasibility of utilizing an expert system to aid in 10CFR50.59 evaluations. This paper discusses the history of 10CFR50.59 reviews, and details the development approach used in the construction of a prototype Safety Review Advisor (SRA). The goals for this expert system prototype are to (1) aid the engineer in the evaluation process by directing his attention to the appropriate critical issues, (2) increase the efficiency, consistency, and thoroughness of the evaluation process, and (3) provide a foundation of appropriate Safety Analysis Report (SAR) references for the reviewer. 6 refs., 2 figs

  5. How Robust Refugee Protection Policies Can Strengthen Human and National Security

    Directory of Open Access Journals (Sweden)

    Donald Kerwin

    2016-09-01

    Full Text Available This paper makes the case that refugee protection and national security should be viewed as complementary, not conflicting state goals. It argues that refugee protection can further the security of refugees, affected states, and the international community. Refugees and international migrants can also advance national security by contributing to a state’s economic vitality, military strength, diplomatic standing, and civic values. The paper identifies several strategies that would, if implemented, promote both security and refugee protection. It also outlines additional steps that the US Congress should take to enhance US refugee protection policies and security. Finally, it argues for the efficacy of political engagement in support of pro-protection, pro-security policies, and against the assumption that political populism will invariably impede support for refugee protection.

  6. 78 FR 46381 - Calamos Advisors LLC and Calamos ETF Trust; Notice of Application

    Science.gov (United States)

    2013-07-31

    ... Advisors LLC and Calamos ETF Trust; Notice of Application July 24, 2013. AGENCY: Securities and Exchange... sections 12(d)(1)(A) and (B) of the Act. Applicants: Calamos Advisors LLC (``Adviser'') and Calamos ETF... series of the Trust will be the Calamos Focus Growth ETF (the ``Initial Fund''), the investment objective...

  7. 77 FR 5585 - Northwestern Mutual Series Fund, Inc. and Mason Street Advisors, LLC; Notice of Application

    Science.gov (United States)

    2012-02-03

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29939; File No. 812-13982] Northwestern Mutual Series Fund, Inc. and Mason Street Advisors, LLC; Notice of Application January 30, 2012... instruments. Applicants: Northwestern Mutual Series Fund, Inc. (``Company'') and Mason Street Advisors, LLC...

  8. Transboundary natural area protection: Broadening the definition of national security

    Science.gov (United States)

    Haven B. Cook

    2007-01-01

    This paper looks at the definition and concept of national security, and examines how the environment is linked with national security. The traditional, state view of national security that guides most foreign policy includes the concepts of military power, sovereignty and geopolitical stability. This paper advocates broadening the definition of security to include...

  9. Guarding America: Security Guards and U.S. Critical Infrastructure Protection

    National Research Council Canada - National Science Library

    Parfomak, Paul W

    2004-01-01

    The Bush Administration's 2003 National Strategy for the Physical Protection of Critical Infrastructures and Key Assets indicates that security guards are an important source of protection for critical facilities...

  10. Protection of data carriers using secure optical codes

    Science.gov (United States)

    Peters, John A.; Schilling, Andreas; Staub, René; Tompkin, Wayne R.

    2006-02-01

    Smartcard technologies, combined with biometric-enabled access control systems, are required for many high-security government ID card programs. However, recent field trials with some of the most secure biometric systems have indicated that smartcards are still vulnerable to well equipped and highly motivated counterfeiters. In this paper, we present the Kinegram Secure Memory Technology which not only provides a first-level visual verification procedure, but also reinforces the existing chip-based security measures. This security concept involves the use of securely-coded data (stored in an optically variable device) which communicates with the encoded hashed information stored in the chip memory via a smartcard reader device.

  11. The Advisor Quality Survey: Good College Advisors Are Available, Knowledgeable, and Autonomy Supportive

    Science.gov (United States)

    Sheldon, Kennon M.; Garton, Bryan; Orr, Rachael; Smith, Amy

    2015-01-01

    Most US institutions of higher education do not assess advisor quality. We report a scale development effort informed by the developmental prescriptions of self-determination theory (Deci & Ryan, 1985, 2000). The 15-item Missouri Advisor Quality Survey assesses advisor knowledge, advisor availability, and advisor autonomy supportiveness.…

  12. 78 FR 54588 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound

    Science.gov (United States)

    2013-09-05

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound AGENCY: Coast Guard, DHS... Security Zone in Commencement Bay, Tacoma, Washington from 6:00 a.m. on September 2, 2013 through 11:59 p.m...

  13. 78 FR 57485 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound

    Science.gov (United States)

    2013-09-19

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound AGENCY: Coast Guard, DHS... Security Zone in Commencement Bay, Tacoma, Washington from 6 a.m. on September 12, 2013 through 11:59 p.m...

  14. 76 FR 27897 - Security and Safety Zone Regulations, Large Passenger Vessel Protection, Captain of the Port...

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0342] Security and Safety Zone Regulations, Large Passenger Vessel Protection, Captain of the Port Columbia River... will enforce the security and safety zone in 33 CFR 165.1318 for large passenger vessels operating in...

  15. 77 FR 9528 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound

    Science.gov (United States)

    2012-02-17

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound AGENCY: Coast Guard, DHS... Waterway Security Zone in Commencement Bay, Tacoma, Washington from 6 a.m. on February 17, 2012, through 11...

  16. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security, confidentiality and protection of... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  17. Radiation Protection, Safety and Security Issues in Ghana

    International Nuclear Information System (INIS)

    Boadu, M. B.; Emi-Reynolds, G.; Amoako, J. K.; Hasford, F.; Akrobortu, E.

    2015-01-01

    The Radiation Protection Board was established in 1993 by PNDC Law 308 as the National Competent Authority for the regulation of radiation sources and radioactive materials in Ghana. The mandate and responsibilities of RPB are prescribed in the legislative instrument, LI 1559 issued in 1993. The operational functions of the Board are carried out by the Radiation Protection Institute, which was established to provide technical support for the enforcement of the legislative instrument. The regulatory activities include among others: – Issuance permits for the import/export of any radiation producing device and radioactive materials into/out of the country. It therefore certifies the radioactivity levels in food and the environmental samples. – Authorization and Inspection of practices using radiation sources and radioactive materials in Ghana. – Undertakes safety assessment services and enforcement actions on practices using radiation sources and radioactive materials in line with regulations. – Provides guidance and technical support in fulfilling regulatory requirement to users of radiation producing devices and radioactive materials nationwide by monitoring of monthly radiation absorbed doses for personnel working at radiation facilities. – Provides support to the management of practices in respect of nuclear and radioactive waste programme. – Calibrates radiation emitting equipment and nuclear instrumentation to ensure the safety of patients, workers and the general public. – Establish guidelines for the mounting (non-ionizing) communication masts. – Environmental monitoring (non-ionizing) programmes for communication masts. With the establishment of the national competent authority, facilities using radioactive sources and radiation emitting devices have been brought under regulatory control. Effective regulatory control of radiation emitting devices are achieved through established legal framework, independent Regulatory Authority supported by

  18. Joint force protection advanced security system (JFPASS) "the future of force protection: integrate and automate"

    Science.gov (United States)

    Lama, Carlos E.; Fagan, Joe E.

    2009-09-01

    The United States Department of Defense (DoD) defines 'force protection' as "preventive measures taken to mitigate hostile actions against DoD personnel (to include family members), resources, facilities, and critical information." Advanced technologies enable significant improvements in automating and distributing situation awareness, optimizing operator time, and improving sustainability, which enhance protection and lower costs. The JFPASS Joint Capability Technology Demonstration (JCTD) demonstrates a force protection environment that combines physical security and Chemical, Biological, Radiological, Nuclear, and Explosive (CBRNE) defense through the application of integrated command and control and data fusion. The JFPASS JCTD provides a layered approach to force protection by integrating traditional sensors used in physical security, such as video cameras, battlefield surveillance radars, unmanned and unattended ground sensors. The optimization of human participation and automation of processes is achieved by employment of unmanned ground vehicles, along with remotely operated lethal and less-than-lethal weapon systems. These capabilities are integrated via a tailorable, user-defined common operational picture display through a data fusion engine operating in the background. The combined systems automate the screening of alarms, manage the information displays, and provide assessment and response measures. The data fusion engine links disparate sensors and systems, and applies tailored logic to focus the assessment of events. It enables timely responses by providing the user with automated and semi-automated decision support tools. The JFPASS JCTD uses standard communication/data exchange protocols, which allow the system to incorporate future sensor technologies or communication networks, while maintaining the ability to communicate with legacy or existing systems.

  19. Analysis of radiological protection and security in the radioactive diagnosis area in a third level hospital

    International Nuclear Information System (INIS)

    Azorin Vega, J.C.; Aazorin Nieto, J.; Rivera Montalvo, T.

    1998-01-01

    Results from the evaluation made to radiological security and protection conditions prevailing in 13 medical diagnosis rooms with X rays at the National Nutrition Institute Zlavador Zubiran (third level hospital), aiming to give adequate protection and radiological security devices to the staff exposed from that hospital and to comply fully with requirements set by the standards

  20. 76 FR 75829 - Treasury Inflation-Protected Securities Issued at a Premium

    Science.gov (United States)

    2011-12-05

    ... Treasury Inflation-Protected Securities Issued at a Premium AGENCY: Internal Revenue Service (IRS... IRS is issuing temporary regulations that provide guidance on the tax treatment of Treasury Inflation....1275-7(d) applies to Treasury Inflation-Protected Securities (TIPS) issued with more than a de minimis...

  1. 77 FR 15319 - Treasury Inflation-Protected Securities Issued at a Premium; Hearing Cancellation

    Science.gov (United States)

    2012-03-15

    ... DEPARTMENT OF THE TREASURY Internal Revenue Service 26 CFR Part 1 [REG-130777-11] RIN 1545-BK45 Treasury Inflation-Protected Securities Issued at a Premium; Hearing Cancellation AGENCY: Internal Revenue...), providing guidance on the tax treatment of Treasury Inflation-Protected Securities issued with more than a...

  2. The development of international refugee protection through the practice of the UN Security Council

    NARCIS (Netherlands)

    Ahlborn, C.

    2010-01-01

    This paper examines the ambivalent influence of the UN Security Council’s practice on the development of international refugee protection since the early 1990s. While the international refugee protection regime did not originally foresee a role for the Security Council, the increasingly complex

  3. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Science.gov (United States)

    2010-01-01

    ... significance (Category III), and for protection of Restricted Data, National Security Information, Safeguards... 10 Energy 2 2010-01-01 2010-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED...

  4. Seven layers of security to help protect biomedical research facilities.

    Science.gov (United States)

    Mortell, Norman

    2010-04-01

    In addition to risks such as theft and fire that can confront any type of business, the biomedical research community often faces additional concerns over animal rights extremists, infiltrations, data security and intellectual property rights. Given these concerns, it is not surprising that the industry gives a high priority to security. This article identifies security threats faced by biomedical research companies and shows how these threats are ranked in importance by industry stakeholders. The author then goes on to discuss seven key 'layers' of security, from the external environment to the research facility itself, and how these layers all contribute to the creation of a successfully secured facility.

  5. The research of computer network security and protection strategy

    Science.gov (United States)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  6. Building a highly available and intrusion tolerant Database Security and Protection System (DSPS).

    Science.gov (United States)

    Cai, Liang; Yang, Xiao-Hu; Dong, Jin-Xiang

    2003-01-01

    Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.

  7. Airport Perimeter Security Advisor, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The aviation system of the United States of America is one of our national treasures. Very few elements of our culture capture the America spirit like aviation. Air...

  8. Protecting livelihoods, boosting food security in Kenya | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Switching to Sudan grass for livestock fodder will increase food security in Kenya Farmers learned new techniques for producing livestock fodder, with important outcomes for household food security. ... The company provided drip kits to 300 farmers in Tana River for chilli production (through loans of US$74 per kit).

  9. 76 FR 18383 - Extension of Sunset Date for Attorney Advisor Program

    Science.gov (United States)

    2011-04-04

    ... Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY INFORMATION: Electronic Version The... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2009-0048] RIN 0960-AH05 Extension of Sunset Date for Attorney Advisor Program AGENCY: Social Security Administration. ACTION: Final...

  10. ACADEMIC ADVISORS: VALUES EDUCATED LEADERS

    Directory of Open Access Journals (Sweden)

    Brizeida Mijares

    2008-07-01

    Full Text Available The purpose of this article is to study the academic advisors’ profile from the attitudes in the learning process view point, being the center of which the need that as an educator, the advisor has to be a leader educated in values. The research was documental, according to the theoretical contributions of Arana and Batista (2006,  Ortega and Minguez (2001 and Denis (2000, among others. It is concluded that an academic advisor in values allows individual and collective trasnformation and an education without values as its center, it is a hollow and useless education.

  11. Cyber Security Analysis by Attack Trees for a Reactor Protection System

    International Nuclear Information System (INIS)

    Park, Gee-Yong; Lee, Cheol Kwon; Choi, Jong Gyun; Kim, Dong Hoon; Lee, Young Jun; Kwon, Kee-Choon

    2008-01-01

    As nuclear facilities are introducing digital systems, the cyber security becomes an emerging topic to be analyzed and resolved. The domestic and other nation's regulatory bodies notice this topic and are preparing an appropriate guidance. The nuclear industry where new construction or upgrade of I and C systems is planned is analyzing and establishing a cyber security. A risk-based analysis for the cyber security has been performed in the KNICS (Korea Nuclear I and C Systems) project where the cyber security analysis has been applied to a reactor protection system (RPS). In this paper, the cyber security analysis based on the attack trees is proposed for the KNICS RPS

  12. Extending Mobile Security Robots to Force Protection Missions

    National Research Council Canada - National Science Library

    Carroll, Daniel

    2002-01-01

    ...) sites for physical security and automated inventory missions MDARS was initiated in 1989 to improve the effectiveness of a shrinking guard force, but was quickly expanded to address the intensive...

  13. Physical protection solutions for security problems at nuclear power plants

    International Nuclear Information System (INIS)

    Darby, J.L.; Jacobs, J.

    1980-09-01

    Under Department of Energy sponsorship, Sandia National Laboratories has developed a broad technological base of components and integrated systems to address security concerns at facilities of importance, including nuclear reactors. The primary security concern at a light water reactor is radiological sabotage, a deliberate set of actions at a plant which could expose the public to a significant amount of radiation (on the order of 10 CFR 100 limits)

  14. 76 FR 34732 - Privacy Act of 1974; Department of Homeland Security/National Protection and Programs Directorate...

    Science.gov (United States)

    2011-06-14

    ... 1974; Department of Homeland Security/National Protection and Programs Directorate--002 Chemical... Homeland Security/National Protection and Programs Directorate--002 Chemical Facility Anti-Terrorism.... 552a, the Department of Homeland Security (DHS)/National Protection and Programs Directorate (NPPD...

  15. How do policy advisors and practitioners prioritise the protection of children from secondhand smoke exposure in a country with advanced tobacco control policy?

    Science.gov (United States)

    Ritchie, Deborah Doreen; Amos, Amanda; Shaw, April; O'Donnell, Rachel; Semple, Sean; Turner, Steve; Martin, Claudia

    2015-01-01

    The aim is to extend understanding of the policy and practice discourses that inform the development of national tobacco control policy to protect children from secondhand smoke exposure (SHSE) in the home, particularly in a country with successful implementation of smoke-free public places legislation. The Scottish experience will contribute to the tobacco control community, particularly those countries at a similar level of tobacco control, as normalising discourses about protecting children from SHSE are becoming more widespread. Case study design using qualitative interviews and focus groups (FGs) with policy makers, health and childcare practitioners during which they were presented with the findings of the Reducing Families' Exposure to Secondhand Smoke (REFRESH) intervention and discussed the implications for their policy and practice priorities. Scotland, UK PARTICIPANTS: Qualitative interviews and FGs were conducted with 30 policy makers and practitioners who were purposively recruited. Participants accepted the harm of SHSE to children; however, action is limited by political expedience due to-the perception of a shift of the public health priority from smoking to alcohol, current financial constraints, more immediate child protection concerns and continuing unresolved ethical arguments. In a country, such as Scotland, with advanced tobacco control strategies, there continue to be challenges to policy and practice development in the more contentious arena of the home. Children's SHSE in their homes is unequivocally accepted as an important health priority, but it is not currently perceived to be a top public health priority in Scotland. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  16. Sandia's experience in designing and implementing integrated high security physical protection systems

    International Nuclear Information System (INIS)

    Caskey, D.L.

    1986-01-01

    As DOE's lead laboratory for physical security, Sandia National Laboratories has had a major physical security program for over ten years. Activities have ranged from component development and evaluation, to full scale system design and implementation. This paper presents some of the lessons learned in designing and implementing state-of-the-art high security physical protection systems for a number of government facilities. A generic system design is discussed for illustration purposes. Sandia efforts to transfer technology to industry are described

  17. Security risk assessment and protection in the chemical and process industry

    OpenAIRE

    Reniers, Genserik; van Lerberghe, Paul; van Gulijk, Coen

    2014-01-01

    This article describes a security risk assessment and protection methodology that was developed for use in the chemical- and process industry in Belgium. The approach of the method follows a risk-based approach that follows desing principles for chemical safety. That approach is beneficial for workers in the chemical industry because they recognize the steps in this model from familiar safety models .The model combines the rings-of-protection approach with generic security practices including...

  18. Protection of minority interest and the development of security markets

    NARCIS (Netherlands)

    Modigliani, F.; Perotti, E.C.

    1997-01-01

    While excessive regulation is an obstacle to the development of financial markets, we argue that lack of basic rules or poorly enforced regulation may explain the relative importance across countries of banking and security markets in financing firms. A selective or arbitrary enforcement transforms

  19. Social Security Disability Insurance: Essential Protection when Work Incapacity Strikes

    Science.gov (United States)

    Reno, Virginia P.; Ekman, Lisa D.

    2012-01-01

    Social Security Disability Insurance (SSDI) is an essential lifeline for millions of Americans. Without it, many families would be in deep financial distress. SSDI is insurance that workers pay for through premiums deducted from their pay. In return, workers gain the right to monthly benefits if a disabling condition ends their capacity to earn a…

  20. Recovering Data from Password Protected Data Security Applications in Android Based Smartphones

    Directory of Open Access Journals (Sweden)

    Hammad Riaz

    2016-06-01

    Full Text Available The standard method of mobile forensic analysis is to attach the mobile device to forensic tools and to perform logical, file system, or physical extraction. A hindrance in analysis arises if the mobile is not properly supported or data in the handset is secured using data security android applications. The techniques discussed in this paper help in the analysis and extraction of data files secured using data hiding password protected android based applications. A few well known data protection android applications are analyzed. The analysis was performed on both partially supported and fully supported sets.

  1. The information systems security officer's guide establishing and managing an information protection program

    CERN Document Server

    Kovacich, Gerald L

    2003-01-01

    Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority you can trust. The new ISSO Guide is just what you need. Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information secur

  2. Security and health protection during the transport of hazardous substances

    International Nuclear Information System (INIS)

    Benkovic, Z.; Bobic, V.

    2009-01-01

    The introduction of this work describes the legal regulations which regulate the conditions and method of the transport of hazardous substances, necessary documentation for storage, forwarding and transport. Hazardous substances are defined and classified according to the ADR. The necessary security measures which are taken for the transport of particular types of hazardous substances are mentioned. Marking and labeling of vehicles for the transport of hazardous substances (plates and lists of hazards), packing and marking of packaging is important. The safety measures which are taken at the filling stations of combustible liquids as well as places specially organized for filling, prohibitions and limitations and necessary transport documentation are mentioned. It is visible from the above mentioned that the activity of the whole security chain is necessary and depends on the good knowledge of basic characteristics and features of substances. All the participants in the security chain have to be familiar with and consistently obey the legal regulations. The manufacturer must know the features of the hazardous substance, supervisory services must be acquainted with the threat and potential danger. The hauler and intervention forces must, in case of accidents and damage, be familiar with the emergency procedures in case of accidents and act properly regarding the threatening dangerous substance.(author)

  3. Taiwan's perspective on electronic medical records' security and privacy protection: lessons learned from HIPAA.

    Science.gov (United States)

    Yang, Che-Ming; Lin, Herng-Ching; Chang, Polun; Jian, Wen-Shan

    2006-06-01

    The protection of patients' health information is a very important concern in the information age. The purpose of this study is to ascertain what constitutes an effective legal framework in protecting both the security and privacy of health information, especially electronic medical records. All sorts of bills regarding electronic medical data protection have been proposed around the world including Health Insurance Portability and Accountability Act (HIPAA) of the U.S. The trend of a centralized bill that focuses on managing computerized health information is the part that needs our further attention. Under the sponsor of Taiwan's Department of Health (DOH), our expert panel drafted the "Medical Information Security and Privacy Protection Guidelines", which identifies nine principles and entails 12 articles, in the hope that medical organizations will have an effective reference in how to manage their medical information in a confidential and secured fashion especially in electronic transactions.

  4. 76 FR 3014 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA

    Science.gov (United States)

    2011-01-19

    ... Coast Guard will enforce the Blair Waterway security zone in Commencement Bay, WA for protection of... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0015] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA AGENCY: Coast Guard, DHS...

  5. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0083] Privacy Act of 1974; Department of Homeland Security/United States Secret Service--004 Protection Information System... Security (DHS)/United States Secret Service (USSS)-004 System name: DHS/USSS-004 Protection Information...

  6. 33 CFR 165.1321 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Protection of... Areas Thirteenth Coast Guard District § 165.1321 Security Zone; Protection of Military Cargo, Captain of... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY...

  7. 17 CFR 240.15c3-3 - Customer protection-reserves and custody of securities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Customer protection-reserves... Markets § 240.15c3-3 Customer protection—reserves and custody of securities. (a) Definitions. For the... the dealer as to that collateral; (iii) The Securities Investor Protection Act of 1970 (15 U.S.C...

  8. Social Protection for Enhanced Food Security in Sub-Saharan Africa

    OpenAIRE

    Stephen Devereux

    2012-01-01

    This paper identifies several positive synergies between social protection programmes and food security outcomes. One function of social protection is to manage and reduce vulnerability, and several instruments are reviewed – weather-indexed insurance, public works programmes, emergency food aid and buffer stock management – which all contribute to stabilising income and access to food across good and bad years, or between the harvest and the hungry season. Other social protection instruments...

  9. Cyber security deterrence and it protection for critical infrastructures

    CERN Document Server

    Martellini, Maurizio

    2013-01-01

    The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to resil

  10. Deploying Difference: Security Threat Narratives and State Displacement from Protected Areas

    Directory of Open Access Journals (Sweden)

    Elizabeth Lunstrum

    2018-01-01

    Full Text Available State actors are increasingly treating protected areas as sites of security threats and policing resident communities as though they are the cause of this insecurity. This is translating into community eviction from protected areas that is authorised by security concerns and logics and hence not merely conservation concerns. We ground this claim by drawing upon empirical work from two borderland conservation areas: Mozambique's Limpopo National Park (LNP and Guatemala's Maya Biosphere Reserve (MBR. In both cases, we show how these security-provoked evictions are authorised by the mobilisation of interlocking axes of difference that articulate notions of territorial trespass with that of a racialised enemy. Rather than a new problem or phenomena, we show how these axes are rooted in prior histories of state actors rendering racialised subjects dangerous, Cold War histories in both cases and a longer colonial history with the LNP. We also show how standing behind these evictions is the nation-state and its practices of protected area territorialisation. From here, we illustrate how the rationale behind displacement from protected areas matters, as evictions become more difficult to contest once they are authorised by security considerations. The cases, however, differ in one key respect. While displacement from the LNP is an instance of conservation-induced displacement (CID, although one re-worked by security considerations, eviction from the MBR is motivated more centrally by security concerns yet takes advantage of protected area legislation. The study hence offers insight into a growing literature on conservation-security encounters and into different articulations of conservation, security, and displacement.

  11. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    Science.gov (United States)

    1985-01-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  12. Protecting smallholders' food security by improving soils | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The resilience of farming systems to climate change and variability depends upon healthy soil. ... communities I know already struggle with perennial food deficits and limited .... Protection de la sécurité alimentaire des petits exploitants grâce à ...

  13. Safe and secure South Africa. Vehicle landmine protection validation testing

    CSIR Research Space (South Africa)

    Reinecke, JD

    2008-11-01

    Full Text Available The objective of this paper is to provide an overview of vehicle landmine protection validation testing in South Africa. A short history of validation test standards is given, followed by a summary of current open test standards in general use...

  14. 75 FR 33857 - DWS Advisor Funds, et al.; Notice of Application

    Science.gov (United States)

    2010-06-15

    ...''). Applicants state that the DWS Funds of Funds will offer investors a range of investment objectives generally... investment objectives and policies of the Unaffiliated Fund; (b) how the performance of securities purchased... Advisor Funds, et al.; Notice of Application June 9, 2010. AGENCY: Securities and Exchange Commission...

  15. Radiation Protection, Safety and Security Issues in Ghana.

    Science.gov (United States)

    Boadu, Mary; Emi-Reynolds, Geoffrey; Amoako, Joseph Kwabena; Akrobortu, Emmanuel; Hasford, Francis

    2016-11-01

    Although the use of radioisotopes in Ghana began in 1952, the Radiation Protection Board of Ghana was established in 1993 and served as the national competent authority for authorization and inspection of practices and activities involving radiation sources until 2015. The law has been superseded by an Act of Parliament, Act 895 of 2015, mandating the Nuclear Regulatory Authority of Ghana to take charge of the regulation of radiation sources and their applications. The Radiation Protection Institute in Ghana provided technical support to the regulatory authority. Regulatory and service activities that were undertaken by the Institute include issuance of permits for handling of a radiation sources, authorization and inspection of radiation sources, radiation safety assessment, safety assessment of cellular signal towers, and calibration of radiation-emitting equipment. Practices and activities involving application of radiation are brought under regulatory control in the country through supervision by the national competent authority.

  16. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    International Nuclear Information System (INIS)

    1995-01-01

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met

  17. [Application of classified protection of information security in the information system of air pollution and health impact monitoring].

    Science.gov (United States)

    Hao, Shuxin; Lü, Yiran; Liu, Jie; Liu, Yue; Xu, Dongqun

    2018-01-01

    To study the application of classified protection of information security in the information system of air pollution and health impact monitoring, so as to solve the possible safety risk of the information system. According to the relevant national standards and requirements for the information system security classified protection, and the professional characteristics of the information system, to design and implement the security architecture of information system, also to determine the protection level of information system. Basic security measures for the information system were developed in the technical safety and management safety aspects according to the protection levels, which effectively prevented the security risk of the information system. The information system established relatively complete information security protection measures, to enhanced the security of professional information and system service, and to ensure the safety of air pollution and health impact monitoring project carried out smoothly.

  18. Charting a Security Landscape in the Clouds: Data Protection and Collaboration in Cloud Storage

    Science.gov (United States)

    2016-07-01

    strength of specific cryptographic primitives used such as Advanced Encryption Standard ( AES ); protection of keys and key materials beyond the protocol...Advanced Encryption Standard ( AES ) with a 256-bit key instead of a 128-bit key for example, is not a particularly insightful observation. Rather, this... AES Advanced Encryption Standard TLS/SSL Transport Layer Security/Security Socket Layer 35 REFERENCES [1] International Data Corporation

  19. Data Protection and the Prevention of Cybercrime: The EU as an area of security?

    OpenAIRE

    PORCEDDA, Maria Grazia

    2012-01-01

    (This working paper is a revised version of Ms. Porcedda's EUI LL.M. thesis, 2012.) Cybercrime and cyber-security are attracting increasing attention, both for the relevance of Critical Information Infrastructure to the national economy and security, and the interplay of the policies tackling them with ‘ICT sensitive’ liberties, such as privacy and data protection. This study addresses the subject in two ways. On the one hand, it aims to cast light on the (legal substantive) nature of, ...

  20. THE PROTECTION OF CONSUMER RIGHTS FOR AVIATION SAFETY AND SECURITY IN INDONESIA AND MALAYSIA

    OpenAIRE

    Annalisa Yahanan; Febrian Febrian; Rohani Abdul Rahim

    2017-01-01

    Indonesia and Malaysia have a good potency for cooperation in aviation industry. It can be seen in the establishing two aviation companies namely PT. Indonesia Air Asia and Malindo which both are low-cost carrier. These aviation industries are categorized as low-cost carrier, however safety and security are absolute factors because these are rights for consumers. This article will describe further about safety and security standard; protecting the rights for consumers in connection with safet...

  1. The Protection of Consumer Rights for Aviation Safety and Security in Indonesia and Malaysia

    OpenAIRE

    Yahanan, Annalisa; Febrian, Febrian; Rahim, Rohani Abdul

    2017-01-01

    Indonesia and Malaysia have a good potency for cooperation in aviation industry. It can be seen in the establishing two aviation companies namely PT. Indonesia Air Asia and Malindo which both are low-cost carrier. These aviation industries are categorized as low-cost carrier, however safety and security are absolute factors because these are rights for consumers. This article will describe further about safety and security standard; protecting the rights for consumers in connection with safet...

  2. Security central processing unit applications in the protection of nuclear facilities

    International Nuclear Information System (INIS)

    Goetzke, R.E.

    1987-01-01

    New or upgraded electronic security systems protecting nuclear facilities or complexes will be heavily computer dependent. Proper planning for new systems and the employment of new state-of-the-art 32 bit processors in the processing of subsystem reports are key elements in effective security systems. The processing of subsystem reports represents only a small segment of system overhead. In selecting a security system to meet the current and future needs for nuclear security applications the central processing unit (CPU) applied in the system architecture is the critical element in system performance. New 32 bit technology eliminates the need for program overlays while providing system programmers with well documented program tools to develop effective systems to operate in all phases of nuclear security applications

  3. Cyber Security Analysis by Attack Trees for a Reactor Protection System

    Energy Technology Data Exchange (ETDEWEB)

    Park, Gee-Yong; Lee, Cheol Kwon; Choi, Jong Gyun; Kim, Dong Hoon; Lee, Young Jun; Kwon, Kee-Choon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2008-10-15

    As nuclear facilities are introducing digital systems, the cyber security becomes an emerging topic to be analyzed and resolved. The domestic and other nation's regulatory bodies notice this topic and are preparing an appropriate guidance. The nuclear industry where new construction or upgrade of I and C systems is planned is analyzing and establishing a cyber security. A risk-based analysis for the cyber security has been performed in the KNICS (Korea Nuclear I and C Systems) project where the cyber security analysis has been applied to a reactor protection system (RPS). In this paper, the cyber security analysis based on the attack trees is proposed for the KNICS RPS.

  4. Privacy and Security Issues Surrounding the Protection of Data Generated by Continuous Glucose Monitors.

    Science.gov (United States)

    Britton, Katherine E; Britton-Colonnese, Jennifer D

    2017-03-01

    Being able to track, analyze, and use data from continuous glucose monitors (CGMs) and through platforms and apps that communicate with CGMs helps achieve better outcomes and can advance the understanding of diabetes. The risks to patients' expectation of privacy are great, and their ability to control how their information is collected, stored, and used is virtually nonexistent. Patients' physical security is also at risk if adequate cybersecurity measures are not taken. Currently, data privacy and security protections are not robust enough to address the privacy and security risks and stymies the current and future benefits of CGM and the platforms and apps that communicate with them.

  5. Privacy preservation and information security protection for patients' portable electronic health records.

    Science.gov (United States)

    Huang, Lu-Chou; Chu, Huei-Chung; Lien, Chung-Yueh; Hsiao, Chia-Hung; Kao, Tsair

    2009-09-01

    As patients face the possibility of copying and keeping their electronic health records (EHRs) through portable storage media, they will encounter new risks to the protection of their private information. In this study, we propose a method to preserve the privacy and security of patients' portable medical records in portable storage media to avoid any inappropriate or unintentional disclosure. Following HIPAA guidelines, the method is designed to protect, recover and verify patient's identifiers in portable EHRs. The results of this study show that our methods are effective in ensuring both information security and privacy preservation for patients through portable storage medium.

  6. 78 FR 30346 - Financial Investors Trust and Hanson McClain Strategic Advisors, Inc.; Notice of Application

    Science.gov (United States)

    2013-05-22

    ...] Financial Investors Trust and Hanson McClain Strategic Advisors, Inc.; Notice of Application May 15, 2013... instruments. Applicants: Financial Investors Trust (the ``Trust''), on behalf of the Pathway Advisors... consistent with the public interest and the protection of investors. Applicants seek an exemption under...

  7. Robust and Secure Watermarking Using Sparse Information of Watermark for Biometric Data Protection

    OpenAIRE

    Rohit M Thanki; Ved Vyas Dwivedi; Komal Borisagar

    2016-01-01

    Biometric based human authentication system is used for security purpose in many organizations in the present world. This biometric authentication system has several vulnerable points. Two of vulnerable points are protection of biometric templates at system database and protection of biometric templates at communication channel between two modules of biometric authentication systems. In this paper proposed a robust watermarking scheme using the sparse information of watermark biometric to sec...

  8. SPILC: An expert student advisor

    Science.gov (United States)

    Read, D. R.

    1990-01-01

    The Lamar University Computer Science Department serves about 350 undergraduate C.S. majors, and 70 graduate majors. B.S. degrees are offered in Computer Science and Computer and Information Science, and an M.S. degree is offered in Computer Science. In addition, the Computer Science Department plays a strong service role, offering approximately sixteen service course sections per long semester. The department has eight regular full-time faculty members, including the Department Chairman and the Undergraduate Advisor, and from three to seven part-time faculty members. Due to the small number of regular faculty members and the resulting very heavy teaching loads, undergraduate advising has become a difficult problem for the department. There is a one week early registration period and a three-day regular registration period once each semester. The Undergraduate Advisor's regular teaching load of two classes, 6 - 8 semester hours, per semester, together with the large number of majors and small number of regular faculty, cause long queues and short tempers during these advising periods. The situation is aggravated by the fact that entering freshmen are rarely accompanied by adequate documentation containing the facts necessary for proper counselling. There has been no good method of obtaining necessary facts and documenting both the information provided by the student and the resulting advice offered by the counsellors.

  9. Protecting America: Reorganizing the Nation's Security Forces to Ensure the Protection of Our Critical Infrastructure

    National Research Council Canada - National Science Library

    Williams

    2004-01-01

    .... This national strategy amplified the significant responsibilities of states, localities, the private sector, and private citizens to protect and defend our communities and our critical infrastructure...

  10. NPP physical protection and information security as necessary conditions for reducing nuclear and radiation accident risks

    International Nuclear Information System (INIS)

    Pogosov, O.Yu.; Derevyanko, O.V.

    2017-01-01

    The paper focuses on the fact that nuclear failures and incidents can lead to radioactive contamination of NPP premises. Nuclear and radiation hazard may be caused by malefactors in technological processes when applying computers or inadequate control in case of insufficient level of information security.The researchers performed analysis of factors for reducing risks of nuclear and radiation accidents at NPPs considering specific conditions related to information security of NPP physical protection systems. The paper considers connection of heterogeneous factors that may increase the risk of NPP accidents, possibilities and ways to improve adequate modelling of security of information with limited access directly related to the functioning of automated set of engineering and technical means for NPP physical protection. Within the overall Hutchinson formalization, it is proposed to include additional functional dependencies on indicators specific for NPPs into analysis algorithms.

  11. Policies and measures for economic efficiency, energy security and environment protection in India

    International Nuclear Information System (INIS)

    Venkaiah, M.; Kaushik, S.C.; Dewangan, M.L.

    2007-01-01

    India needs to sustain 8-10% economic growth to meet energy needs of people below poverty line. India would, at least, need to grow its primary energy supply (3-4 times) of present consumption to deliver a sustained growth of 8% by 2031. This paper discusses India's policies and measures for economic efficiency, environment protection and energy security (3-E). (author)

  12. The normative erosion of international refugee protection through UN Security Council practice

    NARCIS (Netherlands)

    Ahlborn, C.

    2011-01-01

    Since the early 1990s, the UN Security Council has used its enforcement measures under Chapter VII of the UN Charter to address different aspects of international refugee protection from the root causes of forced displacement to the search for durable solutions to the refugee problem. At the same

  13. 40 CFR 35.4190 - How does my group identify a qualified technical advisor?

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false How does my group identify a qualified technical advisor? 35.4190 Section 35.4190 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS...: (1) Demonstrated knowledge of hazardous or toxic waste issues, relocation issues, redevelopment...

  14. 78 FR 7265 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA

    Science.gov (United States)

    2013-02-01

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA AGENCY: Coast Guard, DHS... Security Zone in Commencement Bay, Tacoma, Washington from 6 a.m. on February 1, 2013, through 11:59 p.m...

  15. 78 FR 11981 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA

    Science.gov (United States)

    2013-02-21

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA AGENCY: Coast Guard, DHS... Security Zone in Commencement Bay, Tacoma, Washington from 6 a.m. on February 23, 2013, through 11:59 p.m...

  16. Robust and Secure Watermarking Using Sparse Information of Watermark for Biometric Data Protection

    Directory of Open Access Journals (Sweden)

    Rohit M Thanki

    2016-08-01

    Full Text Available Biometric based human authentication system is used for security purpose in many organizations in the present world. This biometric authentication system has several vulnerable points. Two of vulnerable points are protection of biometric templates at system database and protection of biometric templates at communication channel between two modules of biometric authentication systems. In this paper proposed a robust watermarking scheme using the sparse information of watermark biometric to secure vulnerable point like protection of biometric templates at the communication channel of biometric authentication systems. A compressive sensing theory procedure is used for generation of sparse information on watermark biometric data using detail wavelet coefficients. Then sparse information of watermark biometric data is embedded into DCT coefficients of host biometric data. This proposed scheme is robust to common signal processing and geometric attacks like JPEG compression, adding noise, filtering, and cropping, histogram equalization. This proposed scheme has more advantages and high quality measures compared to existing schemes in the literature.

  17. Improvement of security techniques and protection of biometric data in biometric systems: Presentation of International Standard ISO 24745

    OpenAIRE

    Milinković, Milorad

    2017-01-01

    This paper presents the International Standard ISO 24745 as a potential security tool for biometric information protection, more precisely as a tool for privacy protection in biometric systems. This is one of the latest internationally accepted standards that address the security issues of biometric systems.

  18. 14 CFR 193.5 - How may I submit safety or security information and have it protected from disclosure?

    Science.gov (United States)

    2010-01-01

    ... SUBMITTED INFORMATION § 193.5 How may I submit safety or security information and have it protected from... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false How may I submit safety or security information and have it protected from disclosure? 193.5 Section 193.5 Aeronautics and Space FEDERAL AVIATION...

  19. 33 CFR 165.1313 - Security zone regulations, tank ship protection, Puget Sound and adjacent waters, Washington

    Science.gov (United States)

    2010-07-01

    ... Areas Thirteenth Coast Guard District § 165.1313 Security zone regulations, tank ship protection, Puget... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone regulations, tank ship protection, Puget Sound and adjacent waters, Washington 165.1313 Section 165.1313 Navigation and...

  20. 33 CFR 165.1324 - Safety and Security Zone; Cruise Ship Protection, Elliott Bay and Pier-91, Seattle, Washington.

    Science.gov (United States)

    2010-07-01

    ... Areas Thirteenth Coast Guard District § 165.1324 Safety and Security Zone; Cruise Ship Protection... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zone; Cruise Ship Protection, Elliott Bay and Pier-91, Seattle, Washington. 165.1324 Section 165.1324 Navigation and...

  1. An Energy-Efficient Virtualization-Based Secure Platform for Protecting Sensitive User Data

    Directory of Open Access Journals (Sweden)

    Kyung-Soo Lim

    2017-07-01

    Full Text Available Currently, the exchange cycles of various computers, smartphones, tablets, and others have become shorter, because new high-performance devices continue to roll out rapidly. However, existing legacy devices are not old-fashioned or obsolete to use. From the perspective of sustainable information technology (IT, energy-efficient virtualization can apply a way to increase reusability for special customized devices and enhance the security of existing legacy devices. It means that the virtualization can customize a specially designed purpose using the guest domain from obsolete devices. Thus, this could be a computing scheme that keeps energy supplies and demands in balance for future sustainable IT. Moreover, energy-efficient virtualization can be the long-term and self-sustainable solution such as cloud computing, big data and so forth. By separating the domain of the host device based on virtualization, the guest OS on the segmented domain can be used as a Trusted Execution Environment to perform security features. In this paper, we introduce a secure platform to protect sensitive user data by domain isolation utilizing virtualization. The sensitive user data on our secure platform can protect against the infringement of personal information by malicious attacks. This study is an effective solution in terms of sustainability by recycling them for special purposes or enhancing the security of existing devices.

  2. Evaluating the effectiveness of protected areas for maintaining biodiversity, securing habitats, and reducing threats

    DEFF Research Database (Denmark)

    Geldmann, Jonas

    of this thesis has been to evaluate the performance and effectiveness of protected area in securing biodiversity, by evaluating their ability to either improve conservation responses, the state of biodiversity, or alternatively to reduce the human pressures responsible for the loss of biodiversity. The scope......Protected areas are amongst the most important conservation responses to halt the loss of biodiversity and cover more than 12.7% of the terrestrial surface of earth. Likewise, protected areas are an important political instrument and a key component of the Convention for Biological Diversity (CBD......); seeking to protect at least 17% of the terrestrial surface and 10% of the coastal and marine areas by 2020. Protected areas are expected to deliver on many different objectives covering biodiversity, climate change mitigation, local livelihood, and cultural & esthetic values. Within each...

  3. Informatics in Radiology (infoRAD): personal computer security: part 2. Software Configuration and file protection.

    Science.gov (United States)

    Caruso, Ronald D

    2004-01-01

    Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user. Copyright RSNA, 2004

  4. Role of physical protection and safeguards technology used to Nuclear Material Security

    International Nuclear Information System (INIS)

    Djoko-Irianto, Ign.

    2005-01-01

    The presence of nuclear materials at any nuclear facility must be in secure and must be known as safeguards purpose such as its position, from or type and amount. The clarification of the amount be reported to the national regulatory body and International Atomic Energy Agency (IAEA) as the International regulatory body. The national regulatory body and IAEA will then verify that report. The verification must be done to know there is no difference of the amount, and to give the assurance to the International community that any diversion of safeguarded nuclear material from civil use to a prescribed military purpose would be detected. To carry out verification, several verification techniques such as non-destructive analysis, surveillance, unattended and remote monitoring and environmental sampling are explained to convey the impression how those techniques are implemented. According to the security requirement, the physical protection system including all components of physical protection system have to be effectively designed

  5. A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection

    Science.gov (United States)

    Ahmed, Fawad; Sattar, Farook; Siyal, Mohammed Yakoob; Yu, Dan

    2006-12-01

    We propose a secure watermarking scheme that integrates watermarking with cryptography for addressing some important issues in copyright protection. We address three copyright protection issues—buyer-seller identification, copyright infringement, and ownership verification. By buyer-seller identification, we mean that a successful watermark extraction at the buyer's end will reveal the identities of the buyer and seller of the watermarked image. For copyright infringement, our proposed scheme enables the seller to identify the specific buyer from whom an illegal copy of the watermarked image has originated, and further prove this fact to a third party. For multiple ownership claims, our scheme enables a legal seller to claim his/her ownership in the court of law. We will show that the combination of cryptography with watermarking not only increases the security of the overall scheme, but it also enables to associate identities of buyer/seller with their respective watermarked images.

  6. [ELGA--the electronic health record in the light of data protection and data security].

    Science.gov (United States)

    Ströher, Alexander; Honekamp, Wilfried

    2011-07-01

    The introduction of an electronic health record (ELGA) is a subject discussed for a long time in Austria. Another big step toward ELGA is made at the end of 2010 on the pilot project e-medication in three model regions; other projects should follow. In addition, projects of the ELGA structure are sped up on the part of the ELGA GmbH to install the base of a functioning electronic health record. Unfortunately, many of these initiatives take place, so to speak, secretly, so that in the consciousness of the general public - and that includes not only patients but also physicians and other healthcare providers - always concerns about protection and security of such a storage of health data arouse. In this article the bases of the planned act are discussed taking into account the data protection and data security.

  7. ConstitutionalJustice: Cases of Protection of Freedom and Personal Security in Colombia

    Directory of Open Access Journals (Sweden)

    Viridiana Molinares Hassan

    2014-07-01

    Full Text Available In this paper we present the results of an investigation about judicial protection of freedom and personal security granted by the Constitutional Court (cc of Colombia, with a comparative analysis between the period 1992-2001, to which governments have appointed period of postconstitucionales, which coincides with the issuance of the 1991 Constitution, and the creation of constitutional jurisdiction, and the period 2002-2010, during which it ran the Democratic Security Policy (dsp as a government policy proposal by former president Álvaro Uribe, whose aim was to achieve peace through the declaration of war to the guerrilla group Revolutionary Armed Forces of Colombia (farc. Our interest is to show that the protection of freedom and personal security as the basis of the Constitutional (ec finds in the cc his greatest guarantor, even against closing courts in other jurisdictions that are still rooted in the failed legal positivist paradigm, ignoring the postulates of neoconstitutionalism dc sufficiently developed from a process of creative interpretation and decision-making. This coupled with the importance for the branches of power and knowledge associated scope of freedom and personal security developed by the cc in the difficult context of irregular warfare that exists in Colombia, yet it is, for universal constitutionalism, an example of the development of legal guarantor in the context of current constitutionalism.

  8. THE PROTECTION OF CONSUMER RIGHTS FOR AVIATION SAFETY AND SECURITY IN INDONESIA AND MALAYSIA

    Directory of Open Access Journals (Sweden)

    Annalisa Yahanan

    2017-01-01

    Full Text Available Indonesia and Malaysia have a good potency for cooperation in aviation industry. It can be seen in the establishing two aviation companies namely PT. Indonesia Air Asia and Malindo which both are low-cost carrier. These aviation industries are categorized as low-cost carrier, however safety and security are absolute factors because these are rights for consumers. This article will describe further about safety and security standard; protecting the rights for consumers in connection with safety aviation in Indonesia and Malaysia from the Consumer Protection Law and the Aviation Law. As a result of the research shows that safety standard passenger for air transportation in airport covers information and safety facility in the shape of availability of the emergency safety tools (fires, accidents and natural disasters; information, area and health facility; and healthcare workers. Moreover, safety standards for passenger in an aircraft include information and safety facility in the shape of availability information and the emergency safety tools for passenger in an aircraft. The protection for consumer rights for safety flight in Indonesia as follows: aviation industry has obligation to fulfill minimum standard of safety and security; consumers must be safety from false information which raises concern; aircraft operation which endanger of the passenger; and consumer protection in operating the electronic device which endanger flight. On the other hand, the law of consumer rights in Malaysia relating to aviation are ruled under the Aviation Law as a result of the Warsaw Convention 1929. In conclusion, the verdict of consumer rights related to security aviation begins when the passenger enter to an aircraft, in the aircraft, and by the time they get off the plane.

  9. Considerations Regarding the Security and Protection of E-Banking Services Consumers’ Interests

    OpenAIRE

    Marinela Vrancianu; Liana Anica Popa

    2010-01-01

    A significant number of breaches in the security of electronic banking (e-Banking) system is reported each year, drawing attention to the need to protect and inform customers about the risk of exposure to malicious actions initiated by cyber-criminals. Financial institutions and consumers recognize the fact that attacks and financial frauds are becoming more complex and are perpetrated by a different class of criminal. This class is increasingly sophisticated and uses technology as part of th...

  10. Protecting food security when facing uncertain climate: Opportunities for Afghan communities

    Science.gov (United States)

    Salman, Dina; Amer, Saud A.; Ward, Frank A.

    2017-11-01

    Climate change, population growth, and weakly developed water management institutions in many of the world's dry communities have raised the importance of designing innovative water allocation methods that adapt to water supply fluctuations while respecting cultural sensitivities. For example, Afghanistan faces an ancient history of water supply fluctuations that have contributed to periodic food shortage and famine. Poorly designed and weakly enforced water allocation methods continue to result in agriculture sector underperformance and periodic food shortages when water shortfalls occur. To date, little research has examined alternative water sharing rules on a multi-basin scale to protect food security for a subsistence irrigation society when the community faces water shortage. This paper's contribution examines the economic performance of three water-sharing mechanisms for three basins in Afghanistan with the goal of protecting food security for crop irrigation under ongoing threats of drought, while meeting growing demands for food in the face of anticipated population growth. We achieved this by formulating an integrated empirical optimization model to identify water-sharing measures that minimize economic losses while protecting food security when water shortages occur. Findings show that implementation of either a water trading policy or a proportional shortage policy that respects cultural sensitivities has the potential to raise economic welfare in each basin. Such a policy can reduce food insecurity risks for all trading provinces within each basin, thus being a productive institution for adapting to water shortage when it occurs. Total economic welfare gains are highest when drought is the most severe for which suffering would otherwise be greatest. Gains would be considerably higher if water storage reservoirs were built to store wet year flows for use in dry years. Our results light a path for policy makers, donors, water administrators, and farm

  11. Cyber Security Insider Threats :: Government’s Role in Protecting India’s Critical Infrastructure Sectors

    OpenAIRE

    Vohra, Pulkit

    2014-01-01

    This research identifies the problem of insider threats in the critical infrastructure sectors of India. It is structured to answer the research question: "Why insider threats should be the primary concern for Indian government to protect its critical infrastructure sectors.” It defines the critical infrastructure sectors and portrays the cyber security scenario of India. Also, through the research study, it identifies the lack of awareness and non-seriousness of employees in the critical sec...

  12. 78 FR 29399 - ERNY Financial ETF Trust and ERNY Financial Advisors, LLC; Notice of Application

    Science.gov (United States)

    2013-05-20

    ... Financial ETF Trust and ERNY Financial Advisors, LLC; Notice of Application May 13, 2013. AGENCY: Securities... for an exemption from sections 12(d)(1)(A) and (B) of the Act. Applicants: ERNY Financial ETF Trust... ETF (the ``Initial Fund''), the investment objective of which will be to seek long-term capital...

  13. 78 FR 77175 - Catalyst Capital Advisors LLC and Mutual Fund Series Trust; Notice of Application

    Science.gov (United States)

    2013-12-20

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30832; 812-14101] Catalyst... shareholder approval. APPLICANTS: Catalyst Capital Advisors LLC (``CCA'' or the ``Adviser'') and Mutual Fund Series Trust (formerly Catalyst Funds) (the ``Trust''). DATES: Filing Dates: The application was filed on...

  14. 78 FR 69155 - Altegris Advisors, L.L.C., et al.; Notice of Application

    Science.gov (United States)

    2013-11-18

    ... Advisors, L.L.C., et al.; Notice of Application November 12, 2013. AGENCY: Securities and Exchange..., under sections 6(c) and 17(b) of the Act for an exemption from sections 17(a)(1) and (2) of the Act, and under section 6(c) of the Act for an exemption from rule 12d1- 2(a) under the Act. Summary of...

  15. 77 FR 58593 - Factor Advisors, LLC, et al.; Notice of Application

    Science.gov (United States)

    2012-09-21

    ... Factor Advisors (each, an ``Adviser''), and (b) seek investment returns that correspond to the price and... ``ETF,'' an ``investment company,'' a ``fund,'' or a ``trust.'' All marketing materials that describe... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30204; File No. 812-13934...

  16. A legislative history of the Social Security Protection Act of 2004.

    Science.gov (United States)

    Hansen, Erik

    2008-01-01

    Passage of the original Social Security Act in 1935, Public Law (P.L.) 74-271, represented one of the watershed achievements of social welfare reform in American history. For the first time, workers were guaranteed a basic floor of protection against the hardships of poverty. In the ensuing decades, more than 100 million beneficiaries have realized the value of this protection through the receipt of monthly Social Security payments. As this guarantee has endured and progressed, the policies and administration of such a vast and complex program have required ongoing modifications-more than 150 such revisions over the past 73 years. To some extent, these amendments can be seen as an ongoing refinement process, with the Social Security Protection Act of 2004 (SSPA) being another incremental step in the development of a social insurance program that best meets the evolving needs of American society. This article discusses the legislative history of the SSPA in detail. It includes summaries of the provisions and a chronology of the modification of these proposals as they passed through the House and Senate, and ultimately to the president's desk.

  17. Senior Media Relations Advisor | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    In addition, the Advisor contributes to the Centre's corporate strategic and ... of media strategies, opportunities, approaches, and initiatives to enhance awareness, ... The job demands strategic thinking and planning skills as well as diplomacy, ...

  18. Residual heat removal system diagnostic advisor

    International Nuclear Information System (INIS)

    Tripp, L.

    1991-01-01

    This paper reports on the Residual Heat Removal System (RHRS) Diagnostic Advisor which is an expert system designed to alert the operators to abnormal conditions that exits in the RHRS and offer advice about the cause of the abnormal conditions. The Advisor uses a combination of rule-based and model-based diagnostic techniques to perform its functions. This diagnostic approach leads to a deeper understanding of the RHRS by the Advisor and consequently makes it more robust to unexpected conditions. The main window of the interactive graphic display is a schematic diagram of the RHRS piping system. When a conclusion about a failed component can be reached, the operator can bring up windows that describe the failure mode of the component and a brief explanation about how the Advisor arrived at its conclusion

  19. The Issue of Data Protection and Data Security in the (Pre-Lisbon EU Third Pillar

    Directory of Open Access Journals (Sweden)

    Maria O'Neill

    2010-06-01

    Full Text Available The key functional operability in the pre-Lisbon PJCCM pillar of the EU is the exchange of intelligence and information amongst the law enforcement bodies of the EU. The twin issues of data protection and data security within what was the EU’s third pillar legal framework therefore come to the fore. With the Lisbon Treaty reform of the EU, and the increased role of the Commission in PJCCM policy areas, and the integration of the PJCCM provisions with what have traditionally been the pillar I activities of Frontex, the opportunity for streamlining the data protection and data security provisions of the law enforcement bodies of the post-Lisbon EU arises. This is recognised by the Commission in their drafting of an amending regulation for Frontex , when they say that they would prefer “to return to the question of personal data in the context of the overall strategy for information exchange to be presented later this year and also taking into account the reflection to be carried out on how to further develop cooperation between agencies in the justice and home affairs field as requested by the Stockholm programme.” The focus of the literature published on this topic, has for the most part, been on the data protection provisions in Pillar I, EC. While the focus of research has recently sifted to the previously Pillar III PJCCM provisions on data protection, a more focused analysis of the interlocking issues of data protection and data security needs to be made in the context of the law enforcement bodies, particularly with regard to those which were based in the pre-Lisbon third pillar. This paper will make a contribution to that debate, arguing that a review of both the data protection and security provision post-Lisbon is required, not only in order to reinforce individual rights, but also inter-agency operability in combating cross-border EU crime. The EC’s provisions on data protection, as enshrined by Directive 95/46/EC, do not apply

  20. Spot and Runway Departure Advisor

    Science.gov (United States)

    Jung, Yoon Chul

    2013-01-01

    The Spot and Runway Departure Advisor (SARDA) is a research prototype of a decision support tool for ATC tower controllers to assist in manging and controlling traffic on the surface of an airport. SARDA employs a scheduler to generate an optimal runway schedule and gate push-back - spot release sequence and schedule that improves efficiency of surface operations. The advisories for ATC tower controllers are displayed on an Electronic Flight Strip (EFS) system. The human-in-the-loop simulation of the SARDA tool was conducted for east operations of Dallas-Ft. Worth International Airport (DFW) to evaluate performance of the SARDA tool and human factors, such as situational awareness and workload. The results indicates noticeable taxi delay reduction and fuel savings by using the SARDA tool. Reduction in controller workload were also observed throughout the scenario runs. The future plan includes modeling and simulation of the ramp operations of the Charlotte International Airport, and develop a decision support tool for the ramp controllers.

  1. Radiological protection, safety and security issues in the industrial and medical applications of radiation sources

    International Nuclear Information System (INIS)

    Vaz, Pedro

    2015-01-01

    The use of radiation sources, namely radioactive sealed or unsealed sources and particle accelerators and beams is ubiquitous in the industrial and medical applications of ionizing radiation. Besides radiological protection of the workers, members of the public and patients in routine situations, the use of radiation sources involves several aspects associated to the mitigation of radiological or nuclear accidents and associated emergency situations. On the other hand, during the last decade security issues became burning issues due to the potential malevolent uses of radioactive sources for the perpetration of terrorist acts using RDD (Radiological Dispersal Devices), RED (Radiation Exposure Devices) or IND (Improvised Nuclear Devices). A stringent set of international legally and non-legally binding instruments, regulations, conventions and treaties regulate nowadays the use of radioactive sources. In this paper, a review of the radiological protection issues associated to the use of radiation sources in the industrial and medical applications of ionizing radiation is performed. The associated radiation safety issues and the prevention and mitigation of incidents and accidents are discussed. A comprehensive discussion of the security issues associated to the global use of radiation sources for the aforementioned applications and the inherent radiation detection requirements will be presented. Scientific, technical, legal, ethical, socio-economic issues are put forward and discussed. - Highlights: • The hazards associated to the use of radioactive sources must be taken into account. • Security issues are of paramount importance in the use of radioactive sources. • Radiation sources can be used to perpetrate terrorist acts (RDDs, INDs, REDs). • DSRS and orphan sources trigger radiological protection, safety and security concerns. • Regulatory control, from cradle to grave, of radioactive sources is mandatory.

  2. 17 CFR 240.15b5-1 - Extension of registration for purposes of the Securities Investor Protection Act of 1970 after...

    Science.gov (United States)

    2010-04-01

    ... purposes of the Securities Investor Protection Act of 1970 after cancellation or revocation. 240.15b5-1... purposes of the Securities Investor Protection Act of 1970 after cancellation or revocation. Commission... member within the meaning of Section 3(a)(2) of the Securities Investor Protection Act of 1970 for...

  3. Security controls in an integrated Biobank to protect privacy in data sharing: rationale and study design.

    Science.gov (United States)

    Takai-Igarashi, Takako; Kinoshita, Kengo; Nagasaki, Masao; Ogishima, Soichi; Nakamura, Naoki; Nagase, Sachiko; Nagaie, Satoshi; Saito, Tomo; Nagami, Fuji; Minegishi, Naoko; Suzuki, Yoichi; Suzuki, Kichiya; Hashizume, Hiroaki; Kuriyama, Shinichi; Hozawa, Atsushi; Yaegashi, Nobuo; Kure, Shigeo; Tamiya, Gen; Kawaguchi, Yoshio; Tanaka, Hiroshi; Yamamoto, Masayuki

    2017-07-06

    With the goal of realizing genome-based personalized healthcare, we have developed a biobank that integrates personal health, genome, and omics data along with biospecimens donated by volunteers of 150,000. Such a large-scale of data integration involves obvious risks of privacy violation. The research use of personal genome and health information is a topic of global discussion with regard to the protection of privacy while promoting scientific advancement. The present paper reports on our plans, current attempts, and accomplishments in addressing security problems involved in data sharing to ensure donor privacy while promoting scientific advancement. Biospecimens and data have been collected in prospective cohort studies with the comprehensive agreement. The sample size of 150,000 participants was required for multiple researches including genome-wide screening of gene by environment interactions, haplotype phasing, and parametric linkage analysis. We established the T ohoku M edical M egabank (TMM) data sharing policy: a privacy protection rule that requires physical, personnel, and technological safeguards against privacy violation regarding the use and sharing of data. The proposed policy refers to that of NCBI and that of the Sanger Institute. The proposed policy classifies shared data according to the strength of re-identification risks. Local committees organized by TMM evaluate re-identification risk and assign a security category to a dataset. Every dataset is stored in an assigned segment of a supercomputer in accordance with its security category. A security manager should be designated to handle all security problems at individual data use locations. The proposed policy requires closed networks and IP-VPN remote connections. The mission of the biobank is to distribute biological resources most productively. This mission motivated us to collect biospecimens and health data and simultaneously analyze genome/omics data in-house. The biobank also has the

  4. Methodology of the Auditing Measures to Civil Airport Security and Protection

    Directory of Open Access Journals (Sweden)

    Ján Kolesár

    2016-10-01

    Full Text Available Airports similarly to other companies are certified in compliance with the International Standardization Organization (ISO standards of products and services (series of ISO 9000 Standards regarding quality management, to coordinate the technical side of standardizatioon and normalization at an international scale. In order for the airports to meet the norms and the certification requirements as by the ISO they are liable to undergo strict audits of quality, as a rule, conducted by an independent auditing organization. Focus of the audits is primarily on airport operation economics and security. The article is an analysis into the methodology of the airport security audit processes and activities. Within the framework of planning, the sequence of steps is described in line with the principles and procedures of the Security Management System (SMS and starndards established by the International Standardization Organization (ISO. The methodology of conducting airport security audit is developed in compliance with the national programme and international legislation standards (Annex 17 applicable to protection of civil aviation against acts of unlawful interference.

  5. Theater Security Cooperation Planning with Article 98: How the 2002 Servicemembers' Protection Act Fosters China's Quest for Global Influence

    National Research Council Canada - National Science Library

    Hernandez, Jaime A

    2005-01-01

    The Combatant Commander is hindered in constructing Theater Security Cooperation plans due to the restrictions placed upon foreign military aid dispersal as a result of the 2002 American Servicemembers' Protection Act...

  6. Notification: Audit of the U.S. Environmental Protection Agency’s Compliance with the Federal Information Security Management Act

    Science.gov (United States)

    Project #OA-FY14-0135, February 10, 2014. The Office of Inspector General plans to begin fieldwork for an audit of the U.S. Environmental Protection Agency's compliance with the Federal Information Security Management Act (FISMA).

  7. 33 CFR 165.1317 - Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters, Washington. 165.1317 Section 165.1317 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS...

  8. 33 CFR 165.1318 - Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of the Port Zone 165.1318 Section 165.1318 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND...

  9. The Influence of Security Statement, Technical Protection, and Privacy on Satisfaction and Loyalty; A Structural Equation Modeling

    Science.gov (United States)

    Peikari, Hamid Reza

    Customer satisfaction and loyalty have been cited as the e-commerce critical success factors and various studies have been conducted to find the antecedent determinants of these concepts in the online transactions. One of the variables suggested by some studies is perceived security. However, these studies have referred to security from a broad general perspective and no attempts have been made to study the specific security related variables. This paper intends to study the influence on security statement and technical protection on satisfaction, loyalty and privacy. The data was collected from 337 respondents and after the reliability and validity tests, path analysis was applied to examine the hypotheses. The results suggest that loyalty is influenced by satisfaction and security statement and no empirical support was found for the influence on technical protection and privacy on loyalty. Moreover, it was found that security statement and technical protection have a positive significant influence on satisfaction while no significant effect was found for privacy. Furthermore, the analysis indicated that security statement have a positive significant influence on technical protection while technical protection was found to have a significant negative impact on perceived privacy.

  10. Domestic Labor and the Lack of Social Security Protection in Brazil: Questions for Analysis

    Directory of Open Access Journals (Sweden)

    Rita de Lourdes de Lima

    2010-01-01

    Full Text Available This article analyzes domestic labor in Brazil, considering gender, the sexual division of labor and social security, which are influenced by the social transformations of the late 20th century. To do so, a dialog was established with various theoreticians including: Boschetti, Hirata, Kergoat, Nogueira and Saffioti.A historical review of the sexual division of labor in capitalist society is conducted, utilizing the concept of gender and examining inequality between men and women in the work force. Then, looking at social security in Brazil, the  implications of counter reforms to the system for female labor and particularly for domestic work are analyzed, identifying the real lack of social protection suffered by the entire working class.

  11. Information governance and security protecting and managing your company's proprietary information

    CERN Document Server

    Iannarelli, John G

    2014-01-01

    Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization's most important asset-its proprietary information-safe from cyber and physical compromise. Many intrusions can be prevented if appropriate precautions are taken, and this book establishes the enterprise-level systems and disciplines necessary for managing all the information generated by an organization. In addition, the book encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined in Information Governance and Security, organizations can proactively protect their reputation against the threats that most managers have never even thought of. Provides a step-by-step outline for developing an information governance policy that is appropriate for your organization Includes real-world examples and cases to help illustrate key ...

  12. Information security governance: a risk assessment approach to health information systems protection.

    Science.gov (United States)

    Williams, Patricia A H

    2013-01-01

    It is no small task to manage the protection of healthcare data and healthcare information systems. In an environment that is demanding adaptation to change for all information collection, storage and retrieval systems, including those for of e-health and information systems, it is imperative that good information security governance is in place. This includes understanding and meeting legislative and regulatory requirements. This chapter provides three models to educate and guide organisations in this complex area, and to simplify the process of information security governance and ensure appropriate and effective measures are put in place. The approach is risk based, adapted and contextualized for healthcare. In addition, specific considerations of the impact of cloud services, secondary use of data, big data and mobile health are discussed.

  13. Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability.

    Science.gov (United States)

    Tan, Chun Kiat; Ng, Jason Changwei; Xu, Xiaotian; Poh, Chueh Loo; Guan, Yong Liang; Sheah, Kenneth

    2011-06-01

    Teleradiology applications and universal availability of patient records using web-based technology are rapidly gaining importance. Consequently, digital medical image security has become an important issue when images and their pertinent patient information are transmitted across public networks, such as the Internet. Health mandates such as the Health Insurance Portability and Accountability Act require healthcare providers to adhere to security measures in order to protect sensitive patient information. This paper presents a fully reversible, dual-layer watermarking scheme with tamper detection capability for medical images. The scheme utilizes concepts of public-key cryptography and reversible data-hiding technique. The scheme was tested using medical images in DICOM format. The results show that the scheme is able to ensure image authenticity and integrity, and to locate tampered regions in the images.

  14. An Examination of Organizational Information Protection in the Era of Social Media: A Study of Social Network Security and Privacy Protection

    Science.gov (United States)

    Maar, Michael C.

    2013-01-01

    This study investigates information protection for professional users of online social networks. It addresses management's desire to motivate their employees to adopt protective measures while accessing online social networks and to help their employees improve their proficiency in information security and ability to detect deceptive…

  15. Radiological Threat Reduction (RTR) program: implementing physical security to protect large radioactive sources worldwide

    International Nuclear Information System (INIS)

    Lowe, Daniel L.

    2004-01-01

    The U.S. Department of Energy's Radiological Threat Reduction (RTR) Program strives to reduce the threat of a Radiological Dispersion Device (RDD) incident that could affect U.S. interests worldwide. Sandia National Laboratories supports the RTR program on many different levels. Sandia works directly with DOE to develop strategies, including the selection of countries to receive support and the identification of radioactive materials to be protected. Sandia also works with DOE in the development of guidelines and in training DOE project managers in physical protection principles. Other support to DOE includes performing rapid assessments and providing guidance for establishing foreign regulatory and knowledge infrastructure. Sandia works directly with foreign governments to establish cooperative agreements necessary to implement the RTR Program efforts to protect radioactive sources. Once necessary agreements are in place, Sandia works with in-country organizations to implement various security related initiatives, such as installing security systems and searching for (and securing) orphaned radioactive sources. The radioactive materials of interest to the RTR program include Cobalt 60, Cesium 137, Strontium 90, Iridium 192, Radium 226, Plutonium 238, Americium 241, Californium 252, and Others. Security systems are implemented using a standardized approach that provides consistency through out the RTR program efforts at Sandia. The approach incorporates a series of major tasks that overlap in order to provide continuity. The major task sequence is to: Establish in-country contacts - integrators, Obtain material characterizations, Perform site assessments and vulnerability assessments, Develop upgrade plans, Procure and install equipment, Conduct acceptance testing and performance testing, Develop procedures, and Conduct training. Other tasks are incorporated as appropriate and commonly include such as support of reconfiguring infrastructure, and developing security

  16. Security Hi-tech Individual Extra-light Device Mask: a new protection for [soccer] players.

    Science.gov (United States)

    Cascone, Piero; Petrucci, Bernardino; Ramieri, Valerio; Marianetti, Titto Matteo; TitoMatteo, Marianetti

    2008-05-01

    Among professional [soccer] players, a relevant incidence of maxillofacial trauma has been reported. The main challenge in these particular patients is to give them the possibility of a very short convalescence period and to make possible their agonistic activity as soon as possible. The authors here present an innovative technique to realize this--the Security Hi-tech Individual Extra-Light Device Mask, a customizable protective shield based on the player's face cast. A completely customized mask was forged over the player's face cast to protect the injured area. This mask shortens convalescence period, and due to its realization, it is comfortable and easy fitting, thus allowing the player to perform at a professional level in his sport activity in the shortest time possible.

  17. Systems Thinking Safety Analysis: Nuclear Security Assessment of Physical Protection System in Nuclear Power Plants

    Directory of Open Access Journals (Sweden)

    Tae Ho Woo

    2013-01-01

    Full Text Available The dynamical assessment has been performed in the aspect of the nuclear power plants (NPPs security. The physical protection system (PPS is constructed by the cyber security evaluation tool (CSET for the nuclear security assessment. The systems thinking algorithm is used for the quantifications by the Vensim software package. There is a period of 60 years which is the life time of NPPs' operation. The maximum possibility happens as 3.59 in the 30th year. The minimum value is done as 1.26 in the 55th year. The difference is about 2.85 times. The results of the case with time delay have shown that the maximum possibility of terror or sabotage incident happens as 447.42 in the 58th year and the minimum value happens as 89.77 in the 51st year. The difference is about 4.98 times. Hence, if the sabotage happens, the worst case is that the intruder can attack the target of the nuclear material in about one and a half hours. The general NPPs are modeled in the study and controlled by the systematic procedures.

  18. Radiological protection, safety and security issues in the industrial and medical applications of radiation sources

    Science.gov (United States)

    Vaz, Pedro

    2015-11-01

    The use of radiation sources, namely radioactive sealed or unsealed sources and particle accelerators and beams is ubiquitous in the industrial and medical applications of ionizing radiation. Besides radiological protection of the workers, members of the public and patients in routine situations, the use of radiation sources involves several aspects associated to the mitigation of radiological or nuclear accidents and associated emergency situations. On the other hand, during the last decade security issues became burning issues due to the potential malevolent uses of radioactive sources for the perpetration of terrorist acts using RDD (Radiological Dispersal Devices), RED (Radiation Exposure Devices) or IND (Improvised Nuclear Devices). A stringent set of international legally and non-legally binding instruments, regulations, conventions and treaties regulate nowadays the use of radioactive sources. In this paper, a review of the radiological protection issues associated to the use of radiation sources in the industrial and medical applications of ionizing radiation is performed. The associated radiation safety issues and the prevention and mitigation of incidents and accidents are discussed. A comprehensive discussion of the security issues associated to the global use of radiation sources for the aforementioned applications and the inherent radiation detection requirements will be presented. Scientific, technical, legal, ethical, socio-economic issues are put forward and discussed.

  19. Outline of a future security system to provide physical protection of nuclear installations

    International Nuclear Information System (INIS)

    Rossnagel, A.

    1984-01-01

    Nuclear energy, within three or four decades, may become a main pillar of the world's energy supply. The author discusses the problems entailed by the necessity to protect nuclear facilities against assaults, and whether this can be ensured without interference with civic rights. The method applied by the author to show the significance of the problems is to explain the current situation, and to compare it with a plausible outline of the developments to be expected over the next 50 years. He shows the hazards to be taken into account due to criminal actions by persons from outside, or by persons working in nuclear facilities. A main problem is the fact that the security system to be set up has to encompass not only the nuclear installation itself, but also the surrounding area, and the measures to be taken will have an impact on the society, which necessarily will curtail personal freedom. The author presumes that the necessity to guarantee physical protection of nuclear facilities will lead to a modification of the meaning of basic rights, and states his anxiety that security for nuclear installations might affect our concept of freedom. (HSCH) [de

  20. Security measurements and radiological protection in the source panoramic irradiators and storage in pool

    International Nuclear Information System (INIS)

    Del Valle O, C.

    1996-01-01

    The aim of this paper is to investigate and to study the safety and protecting measurements that must be taken into account in the design and the use of panoramic source irradiators with wet storage or pool, concerning to category IV. The generic characteristics in plants of kind, as well as their description, are mentioned in this paper. The devices, that comply the security and control systems based on their redundancy, diversity and independence, are examined. Likewise, it describes the design requirements of the overcast, of the irradiators, of the source frame, of the transporting system of product, of the procedure access, of the security system of the irradiator shelf control, of the irradiation room, of the irradiation storage pool, of the ventilation system, for the protection in case of fire of fire, for electric energy failures, for the warning symbols and signs. It contains scope about the organization and responsibilities that must be taken into account in plants of this type. A detailed plan has been made for its operation and maintenance, enclosing instructions and registers for this reason. The statement of emergency events and their respective answers, the analysis of cases and reasons that causes accidents and its implementation and regular inspection procedures for the improvement of the plant are also studied. (author). 2 refs

  1. [Child protection network and the intersector implementation of the circle of security as alternatives to medication].

    Science.gov (United States)

    Becker, Ana Laura Martins M M; de Souza, Paulo Haddad; de Oliveira, Mônica Martins; Paraguay, Nestor Luiz Bruzzi B

    2014-09-01

    To describe the clinical history of a child with aggressive behavior and recurring death-theme speech, and report the experience of the team of authors, who proposed an alternative to medication through the establishment of a protection network and the inter-sector implementation of the circle of security concept. A 5-year-old child has a violent and aggressive behavior at the day-care. The child was diagnosed by the healthcare center with depressive disorder and behavioral disorder, and was medicated with sertraline and risperidone. Side effects were observed, and the medications were discontinued. Despite several actions, such as talks, teamwork, psychological and psychiatric follow-up, the child's behavior remained unchanged. A unique therapeutic project was developed by Universidade Estadual de Campinas' Medical School students in order to establish a connection between the entities responsible for the child's care (daycare center, healthcare center, and family). Thus, the team was able to develop a basic care protection network. The implementation of the inter-sector circle of security, as well as the communication and cooperation among the teams, produced very favorable results in this case. This initiative was shown to be a feasible and effective alternative to the use of medication for this child. Copyright © 2014 Sociedade de Pediatria de São Paulo. Publicado por Elsevier Editora Ltda. All rights reserved.

  2. Compensation Services Advisor | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Job Summary The Compensation Services Advisor is accountable for the effective ... Coordinates the annual Performance Review and Assessment System ... by IDRC and the broader financial and social implications of working in Canada. ... in areas such as mortgages, credit and so on to individuals not accustomed to ...

  3. Library and Archival Security: Policies and Procedures To Protect Holdings from Theft and Damage.

    Science.gov (United States)

    Trinkaus-Randall, Gregor

    1998-01-01

    Firm policies and procedures that address the environment, patron/staff behavior, general attitude, and care and handling of materials need to be at the core of the library/archival security program. Discussion includes evaluating a repository's security needs, collections security, security in non-public areas, security in the reading room,…

  4. Electronic Communication of Protected Health Information: Privacy, Security, and HIPAA Compliance.

    Science.gov (United States)

    Drolet, Brian C; Marwaha, Jayson S; Hyatt, Brad; Blazar, Phillip E; Lifchez, Scott D

    2017-06-01

    Technology has enhanced modern health care delivery, particularly through accessibility to health information and ease of communication with tools like mobile device messaging (texting). However, text messaging has created new risks for breach of protected health information (PHI). In the current study, we sought to evaluate hand surgeons' knowledge and compliance with privacy and security standards for electronic communication by text message. A cross-sectional survey of the American Society for Surgery of the Hand membership was conducted in March and April 2016. Descriptive and inferential statistical analyses were performed of composite results as well as relevant subgroup analyses. A total of 409 responses were obtained (11% response rate). Although 63% of surgeons reported that they believe that text messaging does not meet Health Insurance Portability and Accountability Act of 1996 security standards, only 37% reported they do not use text messages to communicate PHI. Younger surgeons and respondents who believed that their texting was compliant were statistically significantly more like to report messaging of PHI (odds ratio, 1.59 and 1.22, respectively). A majority of hand surgeons in this study reported the use of text messaging to communicate PHI. Of note, neither the Health Insurance Portability and Accountability Act of 1996 statute nor US Department of Health and Human Services specifically prohibits this form of electronic communication. To be compliant, surgeons, practices, and institutions need to take reasonable security precautions to prevent breach of privacy with electronic communication. Communication of clinical information by text message is not prohibited under Health Insurance Portability and Accountability Act of 1996, but surgeons should use appropriate safeguards to prevent breach when using this form of communication. Copyright © 2017 American Society for Surgery of the Hand. Published by Elsevier Inc. All rights reserved.

  5. THE RESPONSIBILITY OF PROTECTING (R2P HUMAN RIGHTS AND SECURITY COUNCIL

    Directory of Open Access Journals (Sweden)

    ULDARICIO FIGUEROA PLÁ

    2017-12-01

    Full Text Available The adoption in 1948 of the Convention on the Prevention and Punishment of the Crime of Genocide seemed to open a new era in the international scenario in which these kind of practices apparently are left in the historic past. Reality has shown us that this international instrument was not enough to face arbitrary measures of some Governments. Nevertheless, genocide actions continuing to be performed, and in order to decrease human suffering, “humanitarian intervention” was thought as a response to the ineffectiveness of the Security Council which also brought along arbitrary actions in its invocation, discrediting it. Before the reiterated calls of the Secretary General of the United Nations to prevent and detain massive violations to human rights, an effort has been made in order to standardizing a type of interventions that can respond to massive violations of human rights. This has been called Responsibility to Protect.

  6. Ecological security pattern construction based on ecological protection redlines in China

    Science.gov (United States)

    Zou, Changxin

    2017-04-01

    China is facing huge environmental problems with its current rapid rate of urbanization and industrialization, thus causing biodiversity loss, ecosystem service degradation on a major scale. Against this background, three previous examples (the nature reserve policy, the afforestation policy, and the zoning policy) are implemented in China. These all play important roles in protecting natural ecosystems, although they can sometimes cause new problems and lack rigorous targets for environmental outcomes. To overcome current management conflicts, China has proposed a new "ecological protection redlines" policy (EPR). EPR can be defined as the ecological baseline area needed to provide ecosystem services to guarantee and maintain ecological safety. This study analyzed the scope, objectives and technical methods of delineating EPR in China, and put forward the proposed scheme for the ecological security pattern based on EPR. We constructed three kinds of redlines in China, including key ecological function area redlines, ecological sensitive or fragile areas redlines, and forbidden development areas redlines. For the key ecological function area redlines, a total of 38 water conservation functional zones have been designated, covering a total area of 3.23 million km2; 14 soil conservation zones have been designated, covering a total area of 881700 km2; wind-prevention and sand-fixation zones across the country cover a total area of about 1.73 million km2, accounting for 57.13% of the total land area of the whole country. With respect to the ecologically vulnerable redlines, 18 ecologically vulnerable zones has been designated across the country, covering 2.19 million km2, accounting for 22.86% of the total land area of the whole country. Forbidden development areas redlines covered a total area of 3.29 million km2, accounting for 34.3% of the total land area of the whole country. We also suggest to form a complete ecological security pattern including patterns of

  7. Using virtual reality in the training of security staff and evaluation of physical protection barriers in nuclear facilities

    International Nuclear Information System (INIS)

    Augusto, Silas C.; Mol, Antonio C.A.; Mol, Pedro C.; Sales, Douglas S.

    2009-01-01

    The physical security of facilities containing radioactive objects, an already important matter, now has a new aggravating factor: the existence of groups intending to obtain radioactive materials for the purpose of intentionally induce radioactive contamination incidents, as for example the explosion of dirty bombs in populated regions, damaging both people and environment. In this context, the physical security of such facilities must be reinforced so to reduce the possibilities of such incidents. This paper presents a adapted game engine used as a virtual reality system, enabling the modeling and simulation of scenarios of nuclear facilities containing radioactive objects. In these scenarios, the physical protection barriers, as fences and walls, are simulated along with vigilance screens. Using a computer network, several users can participate simultaneously in the simulation, being represented by avatars. Users can play the roles of both invaders and security staff. The invaders have as objective to surpass the facility's physical protection barriers to steal radioactive objects and flee. The security staff have as objective to prevent and stop the theft of radioactive objects from the facility. The system can be used to analysis simulated scenarios and train vigilance/security staff. A test scenario was already developed and used, and the preliminary tests had satisfactory results, as they enabled the evaluation of the physical protection barriers of the virtual facility, and the training of those who participated in the simulations in the functions of a security staff. (author)

  8. Using virtual reality in the training of security staff and evaluation of physical protection barriers in nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Augusto, Silas C.; Mol, Antonio C.A.; Mol, Pedro C.; Sales, Douglas S. [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil); Universidade do Estado do Rio de Janeiro (UERJ), RJ (Brazil)], e-mail: silas@ien.gov.br, e-mail: mol@ien.gov.br, e-mail: pedro98@gmail.com, e-mail: dsales@ien.gov.br

    2009-07-01

    The physical security of facilities containing radioactive objects, an already important matter, now has a new aggravating factor: the existence of groups intending to obtain radioactive materials for the purpose of intentionally induce radioactive contamination incidents, as for example the explosion of dirty bombs in populated regions, damaging both people and environment. In this context, the physical security of such facilities must be reinforced so to reduce the possibilities of such incidents. This paper presents a adapted game engine used as a virtual reality system, enabling the modeling and simulation of scenarios of nuclear facilities containing radioactive objects. In these scenarios, the physical protection barriers, as fences and walls, are simulated along with vigilance screens. Using a computer network, several users can participate simultaneously in the simulation, being represented by avatars. Users can play the roles of both invaders and security staff. The invaders have as objective to surpass the facility's physical protection barriers to steal radioactive objects and flee. The security staff have as objective to prevent and stop the theft of radioactive objects from the facility. The system can be used to analysis simulated scenarios and train vigilance/security staff. A test scenario was already developed and used, and the preliminary tests had satisfactory results, as they enabled the evaluation of the physical protection barriers of the virtual facility, and the training of those who participated in the simulations in the functions of a security staff. (author)

  9. Final report and documentation for the security enabled programmable switch for protection of distributed internetworked computers LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Van Randwyk, Jamie A.; Robertson, Perry J.; Durgin, Nancy Ann; Toole, Timothy J.; Kucera, Brent D.; Campbell, Philip LaRoche; Pierson, Lyndon George

    2010-02-01

    An increasing number of corporate security policies make it desirable to push security closer to the desktop. It is not practical or feasible to place security and monitoring software on all computing devices (e.g. printers, personal digital assistants, copy machines, legacy hardware). We have begun to prototype a hardware and software architecture that will enforce security policies by pushing security functions closer to the end user, whether in the office or home, without interfering with users' desktop environments. We are developing a specialized programmable Ethernet network switch to achieve this. Embodied in this device is the ability to detect and mitigate network attacks that would otherwise disable or compromise the end user's computing nodes. We call this device a 'Secure Programmable Switch' (SPS). The SPS is designed with the ability to be securely reprogrammed in real time to counter rapidly evolving threats such as fast moving worms, etc. This ability to remotely update the functionality of the SPS protection device is cryptographically protected from subversion. With this concept, the user cannot turn off or fail to update virus scanning and personal firewall filtering in the SPS device as he/she could if implemented on the end host. The SPS concept also provides protection to simple/dumb devices such as printers, scanners, legacy hardware, etc. This report also describes the development of a cryptographically protected processor and its internal architecture in which the SPS device is implemented. This processor executes code correctly even if an adversary holds the processor. The processor guarantees both the integrity and the confidentiality of the code: the adversary cannot determine the sequence of instructions, nor can the adversary change the instruction sequence in a goal-oriented way.

  10. 77 FR 49839 - IndexIQ Advisors LLC and IndexIQ Active ETF Trust; Notice of Application

    Science.gov (United States)

    2012-08-17

    ... Advisors LLC and IndexIQ Active ETF Trust; Notice of Application August 13, 2012. AGENCY: Securities and... IndexIQ Active ETF Trust (the ``Trust''). SUMMARY OF APPLICATION: Applicants request an order that... series, IQ Global Equity Active ETF (``Global Equity ETF''), IQ Global Fixed Income Active ETF (``Global...

  11. 77 FR 66651 - Salient Advisors, L.P. and MarketShares ETF Trust; Notice of Application

    Science.gov (United States)

    2012-11-06

    ... Advisors, L.P. and MarketShares ETF Trust; Notice of Application October 31, 2012 AGENCY: Securities and... ETF Trust (the ``Trust''). Summary of Application: Applicants request an order that permits: (a... statutory trust. The Trust will initially offer one series, the Salient MLP and Energy Infrastructure ETF...

  12. The role of food-security solutions in the protection of natural resources and environment of developing countries.

    Science.gov (United States)

    Lashgarara, Farhad; Mirdamadi, Seyyed Mehdi; Hosseini, Seyyed Jamal Farajollah; Chizari, Mohammad

    2008-10-01

    The majority of the countries of the world, especially developing countries, face environmental problems. Limitations of basic resources (water and soil) and population growth have been the cause of these environmental problems that countries are confronted with. Developing countries have numerous problems, including destruction of forests, vegetable and animal species, and pollution of the environment. Damage to natural resources and the environment can influence the food-security situation. One of the main millennium development goals (MDGs) is protection of the environment and people's health. This cannot obtained unless there is ensured food security. Food security has been defined as a situation when all people, at all times, have physical and economic access to sufficient, safe, and nutritious food needed to maintain a healthy and active life. At the same time, with ensured food security, we can hope to protect the natural resources and environment. The methodology used is descriptive-analytical, and its main purpose is determining the importance and role of food-security solutions in the reduction of environmental hazards and improvement of natural resources and the environmental situation in developing countries. Therefore, some of the most important food-security solutions that can play an important role in this relation were discussed, including conventional research-based technology, biotechnology, information and communication technologies (ICTs), alternative energy sources, and food irradiation.

  13. Develop a solution for protecting and securing enterprise networks from malicious attacks

    Science.gov (United States)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic

  14. Energy Assurance: Essential Energy Technologies for Climate Protection and Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Boudreaux, Philip R [ORNL; Dean, David Jarvis [ORNL; Fulkerson, William [University of Tennessee, Knoxville (UTK); Gaddis, Abigail [University of Tennessee, Knoxville (UTK); Graham, Robin Lambert [ORNL; Graves, Ronald L [ORNL; Hopson, Dr Janet L [University of Tennessee, Knoxville (UTK); Hughes, Patrick [ORNL; Lapsa, Melissa Voss [ORNL; Mason, Thom [ORNL; Standaert, Robert F [ORNL; Wilbanks, Thomas J [ORNL; Zucker, Alexander [ORNL

    2009-12-01

    We present and apply a new method for analyzing the significance of advanced technology for achieving two important national energy goals: climate protection and energy security. Quantitative metrics for U.S. greenhouse gas emissions in 2050 and oil independence in 2030 are specified, and the impacts of 11 sets of energy technologies are analyzed using a model that employs the Kaya identity and incorporates the uncertainty of technological breakthroughs. The goals examined are a 50% to 80% reduction in CO2 emissions from energy use by 2050 and increased domestic hydrocarbon fuels supply and decreased demand that sum to 11 mmbd by 2030. The latter is intended to insure that the economic costs of oil dependence are not more than 1% of U.S. GDP with 95% probability by 2030. Perhaps the most important implication of the analysis is that meeting both energy goals requires a high probability of success (much greater than even odds) for all 11 technologies. Two technologies appear to be indispensable for accomplishment of both goals: carbon capture and storage, and advanced fossil liquid fuels. For reducing CO2 by more than 50% by 2050, biomass energy and electric drive (fuel cell or battery powered) vehicles also appear to be necessary. Every one of the 11 technologies has a powerful influence on the probability of achieving national energy goals. From the perspective of technology policy, conflict between the CO2 mitigation and energy security is negligible. These general results appear to be robust to a wide range of technology impact estimates; they are substantially unchanged by a Monte Carlo simulation that allows the impacts of technologies to vary by 20%.

  15. Protecting America's economy, environment, health, and security against invasive species requires a strong federal program in systematic biology

    Science.gov (United States)

    Hilda Diaz-Soltero; Amy Y. Rossman

    2011-01-01

    Systematics is the science that identifies and groups organisms by understanding their origins, relationships, and distributions. It is fundamental to understanding life on earth, our crops, wildlife, and diseases, and it provides the scientific foundation to recognize and manage invasive species. Protecting America's economy, environment, health, and security...

  16. Decree of the Czechoslovak Atomic Energy Commission concerning the security protection of nuclear installations and nuclear materials

    International Nuclear Information System (INIS)

    1989-01-01

    In compliance with the Czechoslovak State Surveillance over Nuclear Safety of Nuclear Installations Act No. 28/1984, the Decree specifies requirements for assuring security protection of nuclear installations (and their parts) and of nuclear materials with the aim to prevent their abuse for jeopardizing the environment and the health and lives of people. (P.A.)

  17. About application during lectures on protection of the information and information security of the method of "the round table"

    Directory of Open Access Journals (Sweden)

    Simon Zh. Simavoryan

    2011-05-01

    Full Text Available In article the analysis of one of passive methods of transfer of knowledge – lecture is resulted. Experience of teaching of a subject on protection of the information and information security shows that students acquire a teaching material if during lecture to apply an active method of transfer of knowledge – a method of "a round table" is better.

  18. Security and health protection while working with a computer. Survey into the knowledge of users about legal and other requirements.

    OpenAIRE

    Šmejkalová, Petra

    2005-01-01

    This bachelor thesis is aimed at the knowledge of general computer users with regards to work security and health protection. It summarizes the relevant legislation and recommendations of ergonomic specialists. The practical part analyses results of a survey, which examined the computer workplaces and user habits when working with a computer.

  19. Intelligence and Security Standards on Industrial Facilities Protection in Case of Terrorism and Military Attack

    International Nuclear Information System (INIS)

    Stipetic, D.

    2007-01-01

    Industrial facilities, which use toxic chemicals in their production processes, are tempting targets for military and terrorist strategists. They know that these facilities when attacked could produce effects not realizable with conventional weapons. The resulting legal, policy and political consequences would be minimal as compared to that of disseminating toxic chemicals or chemical agents as weapons on enemy territory. At this time there is no clear definition of the legality or illegality of these types of actions used against specific industrial targets for the purpose of mass destruction or disruption. Without clearly defined international regulations covering these actions, we must depend solely on national defense systems. Not only are these regulation not defined, there are no implementation tools, which would be available if the various treaties (CWC/BWC) etc., were able to incorporate needed legislative action. Consequently we must depend on and put into practice defense security standards for industrial facilities for protection against both possible terrorist and military attacks. Emergency responses to incidents involving violent criminals and terrorists are extremely dangerous. Incidents involving weapons of mass destruction, firearms, and hazardous materials have resulted in the injury and death of many firefighters, police officers and medical personnel. We wish to intend display place and role of intelligence and counter intelligence system to prevention potential target and military attack. Security needs to be incorporated into the public safety culture and it must become the routine for how we operate. The recognition and identification process is an important skill that needs continual refinement. The use of transportation or facility paperwork assists in recognizing what potential hazards. A key factor in the successful command and management of a hazmat incident or terrorism event is the ability of public safety agencies to function as a

  20. Mobile Detection Assessment and Response Systems (MDARS): A Force Protection, Physical Security Operational Success

    National Research Council Canada - National Science Library

    Shoop, Brian; Johnston, Michael; Goehring, Richard; Moneyhun, Jon; Skibba, Brian

    2006-01-01

    ... & barrier assessment payloads. Its functions include surveillance, security, early warning, incident first response and product and barrier status primarily focused on a depot/munitions security mission at structured/semi-structured facilities...

  1. Global Health Security

    Centers for Disease Control (CDC) Podcasts

    2017-09-21

    Dr. Jordan Tappero, a CDC senior advisor on global health, discusses the state of global health security.  Created: 9/21/2017 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID), Center for Global Health (CGH).   Date Released: 9/21/2017.

  2. Protecting human health and security in digital Europe: how to deal with the "privacy paradox"?

    Science.gov (United States)

    Büschel, Isabell; Mehdi, Rostane; Cammilleri, Anne; Marzouki, Yousri; Elger, Bernice

    2014-09-01

    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to shed light on the tension between secrecy and transparency in the digital era. A special focus is put from the perspectives of psychology, medical ethics and European law on the contradiction between individuals' motivations for consented processing of personal data and their fears about unknown disclosure, transferal and sharing of personal data via information and communication technologies (named the "privacy paradox"). Potential benefits and harms for the individual and society resulting from the use of computers, mobile phones, the Internet and social media are being discussed. Furthermore, the authors point out the ethical and legal limitations inherent to the processing of personal data in a democratic society governed by the rule of law. Finally, they seek to demonstrate that the impact of information and communication technology use on the individuals' well-being, the latter being closely correlated with a high level of fundamental rights protection in Europe, is a promising feature of the socalled "e-democracy" as a new way to collectively attribute meaning to large-scale online actions, motivations and ideas.

  3. Patient protection in radiotherapy (Radio neurosurgery National Service of the Social Security Mexican Institute)

    International Nuclear Information System (INIS)

    Espiritu R, R.

    2008-12-01

    The perspective of patient protection at the Radio neurosurgery National Service of the Social Security Mexican Institute is divided into three parts: the testing program for equipment acceptance, an assurance quality program based on periodic tests, an also other assurance quality based on tests during the application. Among the technical aspects that influence in the equipment acceptance tests, it is the collimation type, the characteristics of the lineal accelerator, the platform for planning and the network type. In the case of the collimation system and the accelerator characteristics, we consider the manufacturer's specifications and requirements of Mexican Official Standard NOM-033-NUCL-1999, T echnical Specifications for the Teletherapy Units Operation, Linear Accelerators . Planning for the platform takes into account the manufacturer's specifications. In the case of computed tomography as well as review the calibration according to manufacturer's specifications should be considered the standard NOM-229-SSA1-2002. In the case of the linear accelerator must be the radiological characterization of radiation beam as part of this, the absolute dose determination. As for the periodic tests is verified the dose constancy, as well as the flattening and symmetry of X-rays beam. There are also tests battery with daily, monthly and yearly frequencies, which make up the assurance quality program. (Author)

  4. Secure Mix-Zones for Privacy Protection of Road Network Location Based Services Users

    Directory of Open Access Journals (Sweden)

    Rubina S. Zuberi

    2016-01-01

    Full Text Available Privacy has been found to be the major impediment and hence the area to be worked out for the provision of Location Based Services in the wide sense. With the emergence of smart, easily portable, communicating devices, information acquisition is achieving new domains. The work presented here is an extension of the ongoing work towards achieving privacy for the present day emerging communication techniques. This work emphasizes one of the most effective real-time privacy enhancement techniques called Mix-Zones. In this paper, we have presented a model of a secure road network with Mix-Zones getting activated on the basis of spatial as well as temporal factors. The temporal factors are ascertained by the amount of traffic and its flow. The paper also discusses the importance of the number of Mix-Zones a user traverses and their mixing effectiveness. We have also shown here using our simulations which are required for the real-time treatment of the problem that the proposed transient Mix-Zones are part of a viable and robust solution towards the road network privacy protection of the communicating moving objects of the present scenario.

  5. Conceptual design of technical security systems for Russian nuclear facilities physical protection

    International Nuclear Information System (INIS)

    Izmailov, A.V.

    1995-01-01

    Conceptual design of technical security systems (TSS) used in the early stages of physical protection systems (PPS) design for Russia nuclear facilities is discussed. The importance of work carried out in the early stages was noted since the main design solutions are being made within this period (i.e. selection of a structure of TSS and its components). The methods of analysis and synthesis of TSS developed by ''Eleron'' (MINATOM of Russia) which take into account the specific conditions of Russian nuclear facilities and a scope of equipment available are described in the review. TSS effectiveness assessment is based on a probability theory and a simulation. The design procedure provides for a purposeful choice of TSS competitive options including a ''cost-benefit'' criterion and taking into account a prechosen list of design basis threats to be used for a particular facility. The attention is paid to a practical aspect of the methods application as well as to the bilateral Russian-American scientific and technical co-operation in the PPS design field

  6. Dreams that do not come true: Re-addressing social security to expand old-age social protection : The case of informal workers in El Salvador

    NARCIS (Netherlands)

    N.E.A. Joya (Nancy)

    2007-01-01

    textabstractThis paper focuses on old-age income security, with the objective to explore obstacles and opportunities to expand social protection for informal workers in El Salvador. It first introduces the main concepts and debates on social security, social protection, coverage and informality, to

  7. Automated Advice: A Portfolio Management Perspective on Robo-Advisors

    OpenAIRE

    Vukovic, Ana; Bjerknes, Line

    2017-01-01

    In this paper we investigate the predominant robo-advisor model, uncovering that however novel this solution might be, it also relies religiously on imperative contributions to modern portfolio theory that have been made in the past half a century. Despite conforming by and large to passive investment, we find that the slight variations in the methodologies used by robo-advisors introduce significant variability in risk-adjusted returns across the robo-advisor spectrum. Nonetheless, our perfo...

  8. European Trends in Privacy: How can we increase internet security and protect individual privacy?

    Directory of Open Access Journals (Sweden)

    Soren Duus Ostergaard

    2004-04-01

    Full Text Available In the aftermath of September 11 2001 security has been at the top of any Government or Enterprise agenda. Scrutinizing flight passenger lists, conference participants' background, customers' profile and securing access to public and private databases through gateways has become a standard way of doing things. Legislation has been put in place which in many countries give the authorities increased right to analyze personal data ? In some cases overriding existing privacy legislation. >In a networked world everybody leaves traces that are personally individually identifiable (PII. When we use our mobile phone, the cell network provider knows the location you are in and the time of the call. When you browse a bookstore on the internet, an applet will tell the web-site owner of your buying habits - and the moment you make a purchase on the net, you leave behind a sign of your reading habits and intellectual preferences. When you use your credit card on the net to buy flowers, the address of the receiver is recorded and related to your ID. If you are under medical treatment and receive medicine, the prescription will inform about your deceases. Under which circumstances do you want this information to be revealed? Most countries as well as the European Union and its member countries have since long been aware of the potential threat against personal integrity in case a malevolent organization got hold of all this information. And now Governments in most countries are becoming increasingly interested in accessing personal information to prevent terrorism and establish an electronic surveillance of dubious elements in the society. This paper intends to describe how IT solutions with a special focus on the public sector could be developed and deployed that will help organizations as well as individuals to protect their personally identifiable information, set up policies that will be translated to watch dogs that will ensure that these policies are

  9. 78 FR 11702 - AdvisorShares Investments, LLC and AdvisorShares Trust; Notice of Application

    Science.gov (United States)

    2013-02-19

    ..., American Wealth Management, Trim Tabs Asset Management, LLC, Rockledge Advisors, LLC, Your Source Financial... of Investment Management, Office of Investment Company Regulation). SUPPLEMENTARY INFORMATION: The... organized as a Delaware statutory trust and is registered under the Act as an open-end management investment...

  10. Information security of industrial control systems: possible attack vectors and protection methods

    Directory of Open Access Journals (Sweden)

    Ignatiy A. Grachkov

    2018-03-01

    obtaining unauthorized access to industrial control systems using the Shodan search engine is described and recommendations how to ensure information security of the industrial control system are given.

  11. INFORMATION SECURITY: Strengthened Management Needed to Protect Critical Federal Operations and Assets

    National Research Council Canada - National Science Library

    Dodaro, Gene

    1998-01-01

    .... Our most recent report, done at the request of this Committee, delineates the serious information security weaknesses placing critical operations and assets at risk and outlines actions needed...

  12. Population Protection in the 1990s: Managing Risk in the New Security Environment

    National Research Council Canada - National Science Library

    Donley, Patrick

    2003-01-01

    .... Using the protection interventions in northern Iraq, Bosnia, Rwanda, and Kosovo as case studies, this thesis demonstrates that the interveners prioritized the protection of their self-interests...

  13. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2005-09-01

    Cyber security standards, guidelines, and best practices for control systems are critical requirements that have been delineated and formally recognized by industry and government entities. Cyber security standards provide a common language within the industrial control system community, both national and international, to facilitate understanding of security awareness issues but, ultimately, they are intended to strengthen cyber security for control systems. This study and the preliminary findings outlined in this report are an initial attempt by the Control Systems Security Center (CSSC) Standard Awareness Team to better understand how existing and emerging industry standards, guidelines, and best practices address cyber security for industrial control systems. The Standard Awareness Team comprised subject matter experts in control systems and cyber security technologies and standards from several Department of Energy (DOE) National Laboratories, including Argonne National Laboratory, Idaho National Laboratory, Pacific Northwest National Laboratory, and Sandia National Laboratories. This study was conducted in two parts: a standard identification effort and a comparison analysis effort. During the standard identification effort, the Standard Awareness Team conducted a comprehensive open-source survey of existing control systems security standards, regulations, and guidelines in several of the critical infrastructure (CI) sectors, including the telecommunication, water, chemical, energy (electric power, petroleum and oil, natural gas), and transportation--rail sectors and sub-sectors. During the comparison analysis effort, the team compared the requirements contained in selected, identified, industry standards with the cyber security requirements in ''Cyber Security Protection Framework'', Version 0.9 (hereafter referred to as the ''Framework''). For each of the seven sector/sub-sectors listed above, one standard was

  14. Russia’s Security Relations with Finland, Norway, and Sweden

    Science.gov (United States)

    2017-09-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. RUSSIA’S SECURITY... RELATIONS WITH FINLAND, NORWAY, AND SWEDEN by Rory J. Hayden September 2017 Thesis Advisor: Mikhail Tsypkin Co-Advisor: David S. Yost...THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of

  15. Information security with M/490 and BSI protection profile for ensuring data security and security of supply; Informationssicherheit mit M/490 und BSI-Schutzprofil zur Sicherstellung von Datenschutz und Versorgungssicherheit

    Energy Technology Data Exchange (ETDEWEB)

    Kiessling, Andreas [MVV Energie AG, Mannheim (Germany)

    2012-07-01

    The progressive distribution of decentralized energy generation plants as well as the necessary system flexibility result in an increased cross-linking of smart system components. The cross-linking of a critical infrastructure as well as the inclusion of communicative end customers in new market mechanisms and services bring new demands to guarantee data privacy and security of supply. Thus, the data privacy should be ensured already in the system design. It is also crucial to design the end-to-end process reliability in the context of complex component interactions and stakeholder interactions. Concepts in the context of the EU Smart Grid Mandate M/490 as well as the German BSI protection profile are dedicated to ensuring information security and data privacy on top-down and bottom-up approaches which indicate the analogies in the utilization of application clusters as a basis for threat analysis. Based on these concepts, a methodology for profiling of communication standards and security standards based on application descriptions and process descriptions within application case clusters as well as communication analysis and threat assessment with assignment of security levels and data protection classes is described.

  16. Multi-Level Data-Security and Data-Protection in a Distributed Search Infrastructure for Digital Medical Samples.

    Science.gov (United States)

    Witt, Michael; Krefting, Dagmar

    2016-01-01

    Human sample data is stored in biobanks with software managing digital derived sample data. When these stand-alone components are connected and a search infrastructure is employed users become able to collect required research data from different data sources. Data protection, patient rights, data heterogeneity and access control are major challenges for such an infrastructure. This dissertation will investigate concepts for a multi-level security architecture to comply with these requirements.

  17. Social Protection and Economic Security of North African Migrant Workers in France

    Directory of Open Access Journals (Sweden)

    CLAUDIA PARASCHIVESCU

    2013-05-01

    Full Text Available This essay describes and analyses the situation of Maghrebis in France, as far as social security is concerned. The paradoxical situation experienced by these immigrants is related to their eligibility for social security and their discrimination on the labour market. As such, Maghrebis form the precarious layer of French society.

  18. Populous, Precarious – Protected? The Paradox of Social Security for South Asian Agricultural Workers

    NARCIS (Netherlands)

    K.A. Siegmann (Karin Astrid)

    2012-01-01

    textabstractAbstract Social security is firmly rising on the international agenda. Discourses that depart from the assumption that societies can only afford a certain level of social expenditure give way to a recognition that social security is an important investment in development. New

  19. DQC Comments on the Posted Recommendations Regarding Data Security and Privacy Protections

    Science.gov (United States)

    Data Quality Campaign, 2010

    2010-01-01

    The U.S. Department of Education is conducting several activities to address privacy and security issues related to education data. Earlier this year a contractor for the Department convened a group of privacy and security experts and produced a report with recommendations to the Department on ways they can address emerging challenges in…

  20. Expanding Protection Motivation Theory: The Role of Individual Experience in Information Security Policy Compliance

    Science.gov (United States)

    Mutchler, Leigh Ann

    2012-01-01

    The purpose of the present study is to make contributions to the area of behavioral information security in the field of Information Systems and to assist in the improved development of Information Security Policy instructional programs to increase the policy compliance of individuals. The role of an individual's experience in the context of…

  1. Social Security Number Protection Laws: State-by-State Summary Table

    Science.gov (United States)

    Data Quality Campaign, 2011

    2011-01-01

    As state policymakers implement statewide longitudinal data systems that collect, store, link and share student-level data, it is critical that they understand applicable privacy and data security standards and laws designed to ensure the privacy, security, and confidentiality of that data. To help state policymakers navigate this complex legal…

  2. Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection

    Science.gov (United States)

    Sepúlveda, Johanna; Pires, Ricardo; Strum, Marius; Chau, Wang Jiang

    Many of the current electronic systems embedded in a SoC (System-on-Chip) are used to capture, store, manipulate and access critical data, as well as to perform other key functions. In such a scenario, security is considered as an important issue. The Network-on-chip (NoC), as the foreseen communication structure of next-generation SoC devices, can be used to efficiently incorporate security. Our work proposes the implementation of QoSS (Quality of Security Service) to overcome present SoC vulnerabilities. QoSS is a novel concept for data protection that introduces security as a dimension of QoS. In this paper, we present the implementation of two security services (access control and authentication), that may be configured to assume one from several possible levels, the implementation of a technique to avoid denial-of-service (DoS) attacks, evaluate their effectiveness and estimate their impact on NoC performance.

  3. The role of farm advisors in multifunctional landscapes

    DEFF Research Database (Denmark)

    Vesterager, Jens Peter; Lindegaard, Klaus

    2012-01-01

    This study investigates the influence of farm advisors on farmers decisions regarding Multifunctional landscape commons, a concept covering environmental and landscape values that benefit the public but which depend on farmers management practices. The influence of advisors is analysed by combining...

  4. Senior Enlisted Advisor to the CNGB - The National Guard

    Science.gov (United States)

    ARNG Readiness Home : Leadership : SEA Senior Enlisted Advisor to the CNGB Command Sergeant Major Christopher Kepner Command Sergeant Major Christopher Kepner currently serves as the Senior Enlisted Advisor include the United States Army Sergeants Major Academy, Senior Enlisted Joint Professional Military

  5. Assessment of the Groundwater Protection Program Y-12 National Security Complex, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    2005-01-01

    The following report contains an assessment of the Y-12 Groundwater Protection Program (GWPP) for the Y-12 National Security Complex at the Oak Ridge Reservation, Tennessee. The GWPP is administered by BWXT Y-12, L.L.C. for the purpose of groundwater surveillance monitoring. After over 20 years of extensive site characterization and delineation efforts, groundwater in the three hydrogeologic areas that comprise the Y-12 Complex requires a long-term monitoring network strategy that will efficiently satisfy surveillance monitoring objectives set forth in DOE Order 450.1. The GWPP assessment consisted of two phases, a qualitative review of the program and a quantitative evaluation of the groundwater monitoring network using the Monitoring and Remediation Optimization System (MAROS) software methodology. The specific objective of the qualitative section of the review of the GWPP was to evaluate the methods of data collection, management, and reporting and the function of the monitoring network for the Y-12 facility using guidance from regulatory and academic sources. The results of the qualitative review are used to suggest modifications to the overall program that would be consistent with achieving objectives for long-term groundwater monitoring. While cost minimization is a consideration in the development of the monitoring program, the primary goal is to provide a comprehensive strategy to provide quality data to support site decision making during facility operations, long-term resource restoration, and property redevelopment. The MAROS software is designed to recommend an improved groundwater monitoring network by applying statistical techniques to existing historic and current site analytical data. The MAROS methodology also considers hydrogeologic factors, regulatory framework, and the location of potential receptors. The software identifies trends and suggests components for an improved monitoring plan by analyzing individual monitoring wells in the current

  6. 76 FR 823 - Registration of Municipal Advisors

    Science.gov (United States)

    2011-01-06

    ... financial products.\\12\\ For example, as derivatives have developed in the municipal securities market, some... public information regarding the size of the municipal securities derivative market. Estimates of the..., Municipal Derivative Securities--Uses and Valuation 21 (1995) (discussion of revenue bonds). See also...

  7. Weapons of Mass Destruction and Domestic Force Protection: Basic Response Capability for Military, Police & Security Forces

    National Research Council Canada - National Science Library

    Manto, Samuel

    1999-01-01

    ... actions to improve preparedness. This paper examines what a minimum basic response capability for all military, police and security forces should be to ensure at least some chance for their own survival and possible early warning...

  8. Main control computer security model of closed network systems protection against cyber attacks

    Science.gov (United States)

    Seymen, Bilal

    2014-06-01

    The model that brings the data input/output under control in closed network systems, that maintains the system securely, and that controls the flow of information through the Main Control Computer which also brings the network traffic under control against cyber-attacks. The network, which can be controlled single-handedly thanks to the system designed to enable the network users to make data entry into the system or to extract data from the system securely, intends to minimize the security gaps. Moreover, data input/output record can be kept by means of the user account assigned for each user, and it is also possible to carry out retroactive tracking, if requested. Because the measures that need to be taken for each computer on the network regarding cyber security, do require high cost; it has been intended to provide a cost-effective working environment with this model, only if the Main Control Computer has the updated hardware.

  9. Hacking Facebook Privacy and Security

    Science.gov (United States)

    2012-08-28

    REPORT Hacking Facebook Privacy and Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: When people talk about hacking and social networks , they’re...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Facebook , Privacy, Security, Social Network Dr. Jeff Duffany (Advisor), Omar Galban...transmit personal information that many people that they dare not do it personally. FACEBOOK PLATFORM Facebook is a popular social networking

  10. Hospital security and patient elopement: protecting patients and your healthcare facility.

    Science.gov (United States)

    Smith, Thomas A

    2012-01-01

    Regulatory and financial consequences of adverse events associated with patient elopements are bringing new challenges to healthcare security to develop policies and procedures to prevent and respond to such incidents. This article provides an overview of the problem of elopement in healthcare and what it means to the security function; gives a working knowledge of healthcare related standards and guidelines aimed at reducing patient elopement; and reviews the elements of an elopement prevention and response plan for your organization.

  11. Spot and Runway Departure Advisor (SARDA)

    Science.gov (United States)

    Jung, Yoon

    2016-01-01

    Spot and Runway Departure Advisor (SARDA) is a decision support tool to assist airline ramp controllers and ATC tower controllers to manage traffic on the airport surface to significantly improve efficiency and predictability in surface operations. The core function of the tool is the runway scheduler which generates an optimal solution for runway sequence and schedule of departure aircraft, which would minimize system delay and maximize runway throughput. The presentation also discusses the latest status of NASA's current surface research through a collaboration with an airline partner, where a tool is developed for airline ramp operators to assist departure pushback operations. The presentation describes the concept of the SARDA tool and results from human-in-the-loop simulations conducted in 2012 for Dallas-Ft. Worth International Airport and 2014 for Charlotte airport ramp tower.

  12. OTA director to be Clinton's science advisor

    Science.gov (United States)

    Leath, Audrey

    President Clinton has nominated John H. “Jack” Gibbons to be Assistant to the President for Science and Technology, and director of the White House Office of Science and Technology Policy (OSTP). For over a decade, Gibbons has served as director of the Office of Technology Assessment (OTA), a bipartisan research arm of Congress.In nominating Gibbons, Clinton said, “I am delighted to appoint a brilliant scientist and gifted administrator… It is profoundly important that the president have a science advisor who understands science, who understands technology, who understands the practical application of these disciplines to the myriad of problems we face today. And I can tell you that from [Vice-president] Al Gore on down to every other member of Congress I have discussed John Gibbons with, I have hardly ever received more glowing and more consistent recommendations for anyone.”

  13. Thermal performance advisor expert system development

    International Nuclear Information System (INIS)

    McClintock, M.; Hirota, N.; Metzinger, R.

    1991-01-01

    In recent years the electric industry has developed an increased interest in improving efficiency of nuclear power plants. EPRI has embarked upon a research project RP2407, Nuclear Plant Performance Improvements which is designed to address needs in this area. One product of this project has been the Thermal Performance Diagnostic Manual for Nuclear Power Plants (NP-4990P). The purpose of this manual is to provide engineering personnel at nuclear power plants with a consistent way in which to identify thermal performance problems. General Physics is also involved in the development of another computer system called Fossil Thermal Performance Advisor (FTPA) which helps operators improve performance for fossil power plants. FTPA is a joint venture between General Physics and New York State Electric and Gas Company. This paper describes both of these computer systems and uses the FTPA as an interesting comparison that illustrates the considerations required for the development of a computer system that effectively addresses the needs of the users

  14. Data Transfer Advisor with Transport Profiling Optimization

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Liu, Qiang [ORNL; Yun, Daqing [Harrisburg University; Wu, Chase Qishi [New Jersey Institute of Technology; Kettimuthu, R. [Argonne National Laboratory (ANL); Jung, Eun-sung [Argonne National Laboratory (ANL)

    2017-11-01

    The network infrastructures have been rapidly upgraded in many high-performance networks (HPNs). However, such infrastructure investment has not led to corresponding performance improvement in big data transfer, especially at the application layer, largely due to the complexity of optimizing transport control on end hosts. We design and implement ProbData, a PRofiling Optimization Based DAta Transfer Advisor, to help users determine the most effective data transfer method with the most appropriate control parameter values to achieve the best data transfer performance. ProbData employs a profiling optimization based approach to exploit the optimal operational zone of various data transfer methods in support of big data transfer in extreme scale scientific applications. We present a theoretical framework of the optimized profiling approach employed in ProbData as wellas its detailed design and implementation. The advising procedure and performance benefits of ProbData are illustrated and evaluated by proof-of-concept experiments in real-life networks.

  15. Proposal of a system of signalling of security in occupational radiological protection for radiactives and nuclear installations

    International Nuclear Information System (INIS)

    Cambises, P.; Sanchez, A.; Almeida, C.

    2004-01-01

    After five years of implantation of a program for classification and signalling of restricted areas in the IPEN-CNEN-SP, we noticed that the applied measures of radio protection contributed for the improvement of the system of occupational radiological protection, promoting an improvement in the security of the workers, towards the planning in the execution of the activities involving the use of sources of ionizing radiation. Later, during the implantation of this program, the service of occupational radiological protection, there was great difficulty to conciliate its necessities in terms of security signalling, face the absence of existing standardisation in the country for the minimum disposals on the subject in question. Nowadays there are different interpretations of the specific criteria and many effective normative documents that exist in the country. This work presents as proposal the elaboration of a technical guide whose objective is to display the criteria and recommendations that can facilitate to the companies and the responsible ones for the safety to interpret and to apply the national laws and norms. As consequence, the specifics characteristics and the necessary disposals for the implantation for a implantation of a standardised system of signalling of security in the those areas, where labour risks for the workers involving the use of ionizing radiations are established, according to previous classification in terms of the national and international established recommendations. The noticeable aspects considered in the proposal of the technical guide try to attend to the criteria and recommendations presented in national and international laws and norms consulted and currently effective laws in our country, referring to the areas, places, ways of access, routes of circulation, and to danger carried through activities or to the proper installation of radiation sources, and theirs ways of protection. (Author)

  16. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  17. The implementation of nuclear security program and the improvement of physical protection in Indonesia: progress and challenges

    International Nuclear Information System (INIS)

    Khairul

    2009-01-01

    facilities. The nuclear material and its installation is potential target in the facilities so that they needed physical protection measures in prevention and protection of nuclear material and radioactive source against theft and sabotage. The implementation of physical protection of nuclear material and radioactive sources in Indonesia complied with the international instruments such as the Convention of the Physical Protection on Nuclear Material and Facilities, amended on July 2005, and INFCIRC/225/Rev. 4, (corrected), the physical protection of nuclear material and nuclear facilities, June 1999. The application of nuclear energy for power program generation involve in the management of nuclear materials and other radioactive substance. According to international regulation and convention, an effective physical protection system is needed to protect nuclear materials and its facilities against theft and sabotage for both non-proliferation and radiation safety purpose. Further to implementation of the IAEA nuclear security program in the region, Indonesia received two nuclear security services, IPPAS and INSServ mission. Based on the expert mission recommendation, therefore Indonesia improved their physical protection system on nuclear material and facilities against theft and sabotage. One thing that should be considered by the Government of Indonesia is human resource development programmes. So far, some effort has developed to enhance the knowledge of the employee who deals with nuclear material and radioactive substances. It still needed to increase the awareness in particular to personal and other related agencies as well. The Department of Energy's National Nuclear Security Administration discussed security assistance with Indonesia's National Nuclear Energy Agency, BATAN. These upgrades not only reduced the threat of theft at the three research reactors, but also provided local physical protection expertise to use during the concept, design, and operation of

  18. [Changes in workers' rehabilitation procedures under the Brazilian social security system: modernization or undermining of social protection?].

    Science.gov (United States)

    Takahashi, Mara Alice Batista Conti; Iguti, Aparecida Mari

    2008-11-01

    This article describes the changes in workers' rehabilitation practices under the Brazilian National Social Security Institute (INSS) in the 1990s, in the context of neoliberal economic adjustment measures, based on an analysis of INSS documents from 1992 to 1997. The INSS plan for "modernization" of workers' rehabilitation led to: (1) dismantling of multidisciplinary teams; (2) induction of workers to accept proportional retirement pensions and voluntary layoffs; (3) under-utilization of the remaining INSS professional staff; (4) elimination of treatment programs for workers' rehabilitation; and (5) dismantling of INSS rehabilitation centers and clinics. The changes in the Brazilian social security system undermined the county's social security project and hegemony and reduced social security reform to a mere management and fiscal issue. Current "rehabilitation" falls far short of the institution's original purpose of social protection for workers, while aiming at economic regulation of the system to contain costs of workers' benefits. Workers that suffer work-related accidents are denied occupational rehabilitation, which aggravates their social disadvantage when they return to work.

  19. Determinants of physical activity promotion by smoking cessation advisors.

    Science.gov (United States)

    Mas, Sébastien; Bernard, Paquito; Gourlan, Mathieu

    2018-05-17

    To investigate the cross-sectional association between personal physical activity (PA) level, Theory of Planned Behavior (TPB) constructs toward PA promotion, and PA promotion behavior among smoking cessation advisors. 149 smoking cessation advisors were invited to complete online questionnaires. Hypotheses were tested using Bayesian path analysis. Attitudes and perceived behavioral control (PBC) of smoking cessation advisors were related to PA promotion intentions; intentions were in turn related to PA promotion behaviors. Advisors' personal PA level was indirectly associated with PA promotion behaviors through PBC and PA promotion intentions. The TPB is a relevant theoretical framework with which to explore determinants of PA promotion behavior among smoking cessation advisors. The PA level of health care professionals may be linked to PA promotion behavior through some TPB constructs. Smoking cessation advisor training should include education on attitude development (e.g., PA benefits on smoking cessation), PBC (e.g., modality of PA prescription) and PA promotion intentions (e.g., goal setting). Smoking cessation advisors should also be encouraged to regularly practice PA in order to improve their PA promotion behaviors. Copyright © 2018 Elsevier B.V. All rights reserved.

  20. Covering the Monitoring Network: A Unified Framework to Protect E-Commerce Security

    Directory of Open Access Journals (Sweden)

    Lirong Qiu

    2017-01-01

    Full Text Available Multimedia applications in smart electronic commerce (e-commerce, such as online trading and Internet marketing, always face security in storage and transmission of digital images and videos. This study addresses the problem of security in e-commerce and proposes a unified framework to analyze the security data. First, to allocate the definite security resources optimally, we build our e-commerce monitoring model as an undirected network, where a monitored node is a vertex of the graph and a connection between vertices is an undirected edge. Moreover, we aim to find a minimal cover for the monitoring network as the optimal solution of resource allocation, which is defined as the network monitoring minimization problem (NMM. This problem is proved to be NP-hard. Second, by analyzing the latent threats, we design a novel and trusted monitoring system that can integrate incident monitoring, data analysis, risk assessment, and security warnings. This system does not touch users’ privacy data. Third, we propose a sequential model-based risk assessment method, which can predict the risk according to the text semantics. Our experimental results on web scale data demonstrate that our system is flexible enough when monitoring, which also verify the effectiveness and efficiency of our system.

  1. SecureMA: protecting participant privacy in genetic association meta-analysis.

    Science.gov (United States)

    Xie, Wei; Kantarcioglu, Murat; Bush, William S; Crawford, Dana; Denny, Joshua C; Heatherly, Raymond; Malin, Bradley A

    2014-12-01

    Sharing genomic data is crucial to support scientific investigation such as genome-wide association studies. However, recent investigations suggest the privacy of the individual participants in these studies can be compromised, leading to serious concerns and consequences, such as overly restricted access to data. We introduce a novel cryptographic strategy to securely perform meta-analysis for genetic association studies in large consortia. Our methodology is useful for supporting joint studies among disparate data sites, where privacy or confidentiality is of concern. We validate our method using three multisite association studies. Our research shows that genetic associations can be analyzed efficiently and accurately across substudy sites, without leaking information on individual participants and site-level association summaries. Our software for secure meta-analysis of genetic association studies, SecureMA, is publicly available at http://github.com/XieConnect/SecureMA. Our customized secure computation framework is also publicly available at http://github.com/XieConnect/CircuitService. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  2. Exploring Factors Influencing Self-Efficacy in Information Security an Empirical Analysis by Integrating Multiple Theoretical Perspectives in the Context of Using Protective Information Technologies

    Science.gov (United States)

    Reddy, Dinesh Sampangirama

    2017-01-01

    Cybersecurity threats confront the United States on a daily basis, making them one of the major national security challenges. One approach to meeting these challenges is to improve user cybersecurity behavior. End user security behavior hinges on end user acceptance and use of the protective information technologies such as anti-virus and…

  3. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.

    Science.gov (United States)

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2014-07-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation's electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.

  4. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment

    Science.gov (United States)

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2013-01-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments. PMID:25685516

  5. Ethical Decision-Making for Homeland Security

    Science.gov (United States)

    2013-09-01

    PhD Thesis Co-Advisor Anders Strindberg, PhD Thesis Co-Advisor Mohammed Hafez, PhD Chair, Department of National Security Affairs...expectations may be deleterious in the long-term, emotionally, psychologically , spiritually , and socially (what we label as moral injury)” (Litz 2009). They...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited ETHICAL DECISION

  6. Marketing advisors and their role for junior gas producers

    International Nuclear Information System (INIS)

    Maffitt, D.W.

    1997-01-01

    The role of marketing advisors in the new deregulated natural gas industry was discussed. These producer-oriented marketing consultants are specialists in providing affordable marketing services to junior gas producers on an 'as-needed' basis. The most important service provided by marketing advisors is helping the client identify management problems, analyze such problems and recommend solutions. Accordingly, the marketing advisor should be independent and objective, with no conflict of interests. He/she should be prepared to invest a lot of time and effort in providing the junior producer with a customized diagnosis of its marketing problems. 5 refs., 3 figs

  7. Marketing advisors and their role for junior gas producers

    Energy Technology Data Exchange (ETDEWEB)

    Maffitt, D.W. [Phoenix Gas Marketing Consultants Inc., Calgary, AB (Canada)

    1997-05-01

    The role of marketing advisors in the new deregulated natural gas industry was discussed. These producer-oriented marketing consultants are specialists in providing affordable marketing services to junior gas producers on an `as-needed` basis. The most important service provided by marketing advisors is helping the client identify management problems, analyze such problems and recommend solutions. Accordingly, the marketing advisor should be independent and objective, with no conflict of interests. He/she should be prepared to invest a lot of time and effort in providing the junior producer with a customized diagnosis of its marketing problems. 5 refs., 3 figs.

  8. United States Seaport Security: Protection Against a Nuclear Device Attack Delivered in a Shipping Cargo Container

    Science.gov (United States)

    2014-06-13

    off a radioactive dirty bomb, and on 29 June Moldavian undercover security agents posing as a North African buyer arrested six men trying to sell...military targets in various countries, including the 11 September 2001 attacks, 1998 U.S. Embassy bombings, USS Cole bombings, and 2002 Bali bombings

  9. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography

    Directory of Open Access Journals (Sweden)

    Murilo Coutinho

    2018-04-01

    Full Text Available Researches in Artificial Intelligence (AI have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC. Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one.

  10. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography.

    Science.gov (United States)

    Coutinho, Murilo; de Oliveira Albuquerque, Robson; Borges, Fábio; García Villalba, Luis Javier; Kim, Tai-Hoon

    2018-04-24

    Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one.

  11. 75 FR 75432 - Protection of Collateral of Counterparties to Uncleared Swaps; Treatment of Securities in a...

    Science.gov (United States)

    2010-12-03

    ... security-based swaps. The legislation was enacted to reduce risk, increase transparency, and promote market... that turnover of control shall be made promptly upon presentation of a statement in writing, signed by an authorized person under penalty of perjury, that one party is entitled to such turnover pursuant...

  12. Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation

    NARCIS (Netherlands)

    Massacci, F.; Prest, M.; Zannone, N.

    2005-01-01

    Extending Requirements Engineering modelling and formal analysis methodologies to cope with Security Requirements has been a major effort in the past decade. Yet, only few works describe complex case studies that show the ability of the informal and formal approaches to cope with the level

  13. SOCIAL SECURITY SYSTEM-A SPECIAL FORM OF PROTECTION OF ROMANIAN SOCIETY

    OpenAIRE

    Maria Mirabela Ianc Florea

    2012-01-01

    In a democratic State, social protection is a fundamental element of State policy, because the implementation is carried out prevention, reduction or elimination of the consequences of events which are regarded as "social risk" on the level of living of the population. Social protection is designed to ensure a basic standard of living for all people, irrespective of the means by which they have.

  14. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    Science.gov (United States)

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  15. Obsessive-Compulsive Homeland Security: Insights from the Neurobiological Security Motivation System

    Science.gov (United States)

    2018-03-01

    HOMELAND SECURITY: INSIGHTS FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM by Marissa D. Madrigal March 2018 Thesis Advisor...FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM 5. FUNDING NUMBERS 6. AUTHOR(S) Marissa D. Madrigal 7. PERFORMING ORGANIZATION NAME(S) AND...how activation of the neurobiological security- motivation system can lead to securitization in response to a security speech act. It explores the model

  16. Programs of the Office of the Science Advisor (OSA)

    Science.gov (United States)

    Office of the Science Advisor provides leadership in cross-Agency science and science policy. Program areas: Risk Assessment, Science and Technology Policy, Human Subjects Research, Environmental Measurement and Modeling, Scientific Integrity.

  17. Thomas Sinks, Director, Office of the Science Advisor

    Science.gov (United States)

    Biography of the Director of the Office of the Science Advisor which is responsible for is responsible for EPA’s human subject research ethics, scientific integrity, and developing cross-agency science policy guidance.

  18. Experience with the shift technical advisor position

    International Nuclear Information System (INIS)

    Melber, B.D.; Olson, J.; Schreiber, R.E.; Winges, L.

    1984-03-01

    The provision of engineering expertise on shift at commercial nuclear power plants has mainly taken the form of the Shift Technical Advisor (STA). This person, acting in a capacity that is part engineer and part operator, is expected to advise the operations crew in the event of an emergency and review plant operating experience during normal circumstances. The position was mandated by the Nuclear Regulatory Commission following the incident at Three Mile Island. This report expands on a growing body of knowledge regarding the effectiveness of the STA. The new data presented here come from interviews with plant personnel and utility officials from nine sites. Researchers from the Pacific Northwest Laboratory (PNL) interviewed plant personnel, including the STA and immediate management, the shift supervisor and management, the training department, and ancillary staff, all of whom affect the intended performance of the STA. The conclusions of the report are that the design of the STA position results in limited contribution during emergencies; more comprehensive ways should be sought to provide the variety and specificity of engineering expertise needed during such times

  19. Experience with the shift technical advisor position

    Energy Technology Data Exchange (ETDEWEB)

    Melber, B.D.; Olson, J.; Schreiber, R.E.; Winges, L.

    1984-03-01

    The provision of engineering expertise on shift at commercial nuclear power plants has mainly taken the form of the Shift Technical Advisor (STA). This person, acting in a capacity that is part engineer and part operator, is expected to advise the operations crew in the event of an emergency and review plant operating experience during normal circumstances. The position was mandated by the Nuclear Regulatory Commission following the incident at Three Mile Island. This report expands on a growing body of knowledge regarding the effectiveness of the STA. The new data presented here come from interviews with plant personnel and utility officials from nine sites. Researchers from the Pacific Northwest Laboratory (PNL) interviewed plant personnel, including the STA and immediate management, the shift supervisor and management, the training department, and ancillary staff, all of whom affect the intended performance of the STA. The conclusions of the report are that the design of the STA position results in limited contribution during emergencies; more comprehensive ways should be sought to provide the variety and specificity of engineering expertise needed during such times.

  20. ADVISOR Users Conference Proceedings 2000 - Final Electronic version

    Energy Technology Data Exchange (ETDEWEB)

    NREL

    2000-09-26

    This is a compilation of papers presented at the ADVISOR (ADvanced Vehicle SimulatOR) Users Conference held in Costa Mesa, California, August 24-25, 2000. Major topics of the conference included modeling and simulation; partnering with the auto industry; co-simulation: partnering with the software industry in optimization and thermal modeling and geometric and mechanical modeling; forward-looking simulations coupled with ADVISOR; new concepts from universities; validation, vehicle development and applications.

  1. Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security

    Science.gov (United States)

    Breiing, Marcus; Cole, Mara; D'Avanzo, John; Geiger, Gebhard; Goldner, Sascha; Kuhlmann, Andreas; Lorenz, Claudia; Papproth, Alf; Petzel, Erhard; Schwetje, Oliver

    This paper outlines the scientific goals, ongoing work and first results of the SiVe research project on critical infrastructure security. The methodology is generic while pilot studies are chosen from airport security. The outline proceeds in three major steps, (1) building a threat scenario, (2) development of simulation models as scenario refinements, and (3) assessment of alternatives. Advanced techniques of systems analysis and simulation are employed to model relevant airport structures and processes as well as offences. Computer experiments are carried out to compare and optimise alternative solutions. The optimality analyses draw on approaches to quantitative risk assessment recently developed in the operational sciences. To exploit the advantages of the various techniques, an integrated simulation workbench is build up in the project.

  2. Protection of personal information in South Africa: a framework for biometric data collection security

    CSIR Research Space (South Africa)

    Mzila, Phiwa

    2016-11-01

    Full Text Available personal information. Like many other countries, South Africa, in 2013 officially approved and enacted the Protection of Personal Information Act, which gives guidelines that should be followed when processing personal information. The Act regards biometric...

  3. Notification: Assessment of the Qualifications of Environmental Protection Agency Personnel With Significant Security Responsibilities

    Science.gov (United States)

    Project #OMS-FY12-0006, February 15, 2012. The U.S. Environmental Protection Agency (EPA) Office of Inspector General plans to begin preliminary research for the subject project, which will be performed by a contractor.

  4. DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI)

    Science.gov (United States)

    2016-04-21

    Sensitive Compartmented Information ( SCI ) References: See Enclosure 1 1. PURPOSE. In accordance with the authority in DoD Directive (DoDD...collateral, special access program, SCI , and controlled unclassified information (CUI) within an overarching DoD Information Security Program...use, and dissemination of SCI within the DoD pursuant to References (a), (c), and (e) and Executive Order 12333 (Reference (h)). 2

  5. Panel on protection and management of plutonium: Subpanel on safeguards and security

    International Nuclear Information System (INIS)

    Tape, J.W.

    1995-01-01

    Nuclear materials safeguards and security systems are described in the context of the nuclear nonproliferation regime. Materials of interest to safeguards, threats, proposals to strengthen International Atomic Energy Agency safeguards, evolving safeguards issues and requirements, system effectiveness, and elements of a global nuclear materials management regime are discussed. Safeguards are seen as an essential element of nuclear materials management, but not a driver for decisions regarding nuclear power or the disposal of excess weapon nuclear materials

  6. The use of information technology security assessment criteria to protect specialized computer systems

    International Nuclear Information System (INIS)

    Lykov, V.A.; Shein, A.V.; Piskarev, A.S.; Devaney, D.M.; Melton, R.B.; Hunteman, W.J.; Prommel, J.M.; Rothfuss, J.S.

    1997-01-01

    The purpose of this paper is to discuss the information security assessment criteria used in Russia and compare it with that used in the United States. The computer system security assessment criteria utilized by the State Technical Commission of Russia and similar criteria utilized by the US Department of Defense (TCSEC) are intended for the development and implementation of proven methods for achieving a required level of information security. These criteria are utilized, first and foremost, when conducting certification assessments of general purpose systems. The Russian Federation is creating specialized systems for nuclear material control and accountancy (MC and A) within the framework of the international laboratory-to-laboratory collaboration. Depending on the conditions in which the MC and A system is intended to operate, some of the criteria and the attendant certification requirements may exceed those established or may overlap the requirements established for attestation of such systems. In this regard it is possible to modify the certification and attestation requirements depending on the conditions in which a system will operate in order to achieve the ultimate goal--implementation of the systems in the industry

  7. Flexicurity as a measuring leakage protection of workers: between "social pollution" and "total security".

    Directory of Open Access Journals (Sweden)

    Calogero Massimo Cammalleri

    2012-01-01

    Full Text Available Was not the labour problem the same everywhere? The paper at­tempts to answer this question by proposing a re-interpretation of flexicurity through the comparison with the economic concepts of externalities and distortion of competition. After a methodological and epistemological premise, based on a multidisciplinary literature, the paper - crit­ically addresses the origins of flexicurity and argues that it lacks an archetypical definition, especially in the formulation of the EU Commission. Hence, the paper considers flexicurity as any balance between flexibility and security and, therefore, pro­poses ordering any set of contracts, providing the same balance and with the same regulatory framework, in “communities”. It is assumed, therefore, that communities can differ either in terms of a “protective” trade­-off, where the differential is not a surrogate measure of security, or in terms of an economic trade-off, where it is met by the provision of social insurance or security. One of these sets is called community 0 and it corresponds to undeclared work, not only illegal, but also completely devoid of security and fully flexible. After identifying from ILO, EU and constitutional sources the foundation of the “incompressibility” of rights which guarantee decent work, the paper likens decent work to a public good of general interest, in the same way as laws generally recognize the natural environment. On the basis of this comparative axiom, the paper proposes considering the dispersion of security produced by undeclared work as “un-decent” work and, therefore, as a form of “pollution”. The paper proposes, conversely, to define as a “total secure” environment one where there is no loss of se­curity and, therefore, a non-polluted environment. Because an environment can be little or very polluted, the paper proposes considering as social pollution any form, even legal, of security leakage - such as that induced by the

  8. Agroenergy production from biomass in integrated agroforestry systems: an alternative to achieve food security and environmental protection

    International Nuclear Information System (INIS)

    Suárez, J.; Martín, G. J.

    2010-01-01

    The objective of this paper is to offer considerations about agroenergy production from biomass in integrated agroforestry systems. At present, worldwide, marked by a group of hazards that threaten human existence, there is a challenge mainly in the rural context: how can the coexistence of agroenergy, food security and environmental protection be achieved?, in the presence of climate changes, environmental degradation, food crises and the growing biofuels vs food contradiction, generated by a senseless policy for obtaining first-generation agrofuels from large extensions of food monocrops, which is morally rejectable. Biofuels are also considered an ecological alternative to fossil fuels, because of their reduction capacity in the emission of greenhouse gasses and because they promote the development of rural communities in southern countries; this is enhanced in integrated agroforestry systems, in which biofuels, of first as well as second generation, can be produced, especially with the application of the concept of biorefinery which allows converting biomass into many products, which total added value can be higher than the one generated by fossil fuels. International projects, which promote integrated and sustainable food and energy production in the context of agroforestry integrated systems, at local scale, contribute to this purpose. The authors consider that the execution of projects and experiences about agroenergy has the main objective of achieving energetic sustainability and food security at local scale, in rural areas, taking into account environmental protection. (author)

  9. The North Atlantic Treaty Organization and the European Union’s Common Security and Defense Policy: Intersecting Trajectories

    Science.gov (United States)

    2011-07-01

    Lieutenant General, Canadian Forces, Canadian Military Repre- sentative to NATO Elizabeth Race, Deputy Defence Policy Advisor, Canadian Joint...Ruehle, Head, Energy Security Section, Emerging Security Challenges Division, NATO ( Brus - sels) Patrick Nash, Lieutenant General, Irish Army, for- mer

  10. State Security Breach Response Laws: State-by-State Summary Table. Using Data to Improve Education: A Legal Reference Guide to Protecting Student Privacy and Data Security

    Science.gov (United States)

    Data Quality Campaign, 2011

    2011-01-01

    Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…

  11. A security approach based on honeypots: Protecting Online Social network from malicious profiles

    Directory of Open Access Journals (Sweden)

    Fatna Elmendili, Nisrine Maqran

    2017-04-01

    Full Text Available In the recent years, the fast development and the exponential utilization of social networks have prompted an expansion of social Computing. In social networks users are interconnected by edges or links, where Facebook, twitter, LinkedIn are most popular social networks websites. Due to the growing popularity of these sites they serve as a target for cyber criminality and attacks. It is mostly based on how users are using these sites like Twitter and others. Attackers can easily access and gather personal and sensitive user’s information. Users are less aware and least concerned about the security setting. And they easily become victim of identity breach. To detect malicious users or fake profiles different techniques have been proposed like our approach which is based on the use of social honeypots to discover malicious profiles in it. Inspired by security researchers who used honeypots to observe and analyze malicious activity in the networks, this method uses social honeypots to trap malicious users. The two key elements of the approach are: (1 The deployment of social honeypots for harvesting information of malicious profiles. (2 Analysis of the characteristics of these malicious profiles and those of deployed honeypots for creating classifiers that allow to filter the existing profiles and monitor the new profiles.

  12. Danish Rules on Securities and other protective rights in the chartparty trade

    DEFF Research Database (Denmark)

    Siig, Kristina

    2016-01-01

    . The paper will discuss the problem with the starting point in Danish law on the subject, and investigate whether Danish law is apt to protect the conflicting interests of the three parties. However, the paper will make comparisons to other laws, mainly English law and Norwegian law. Also, the paper...

  13. Description of the map board portion of the Security Operations Center of the Plutonium Protection System

    International Nuclear Information System (INIS)

    Ringler, C.E.

    1979-05-01

    This report describes the console map board which is part of the Sandia-designed Plutonium Protection System tested at the Hanford Works. The board displays areas under surveillance and contains alarm lights and switches for communicating with the system's computer

  14. Perspective of the Science Advisor to the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    WEART, WENDELL D.

    1999-01-01

    In 1975 Sandia National Laboratories (SNL) was asked by the predecessor to the Department of Energy to assume responsibility for the scientific programs necessary to assure the safe and satisfactory development of a geologic repository in the salt beds of southeast New Mexico. Sandia has continued in the role of Science Advisor to the Waste Isolation Pilot Plant (WIPP) to the present time. This paper will share the perspectives developed over the past 25 years as the project was brought to fruition with successful certification by the Environmental Protection Agency (EPA) on May 13, 1998 and commencement of operations on April 26, 1999

  15. An Application of Automated Theorem Provers to Computer System Security: The Schematic Protection Model

    Science.gov (United States)

    2010-06-01

    z ∃ dom(Y) • true A link is denoted by a function linki (X, Y) where X and Y are formal parameters representing entities and is evaluated as true or...X/rc ∃ dom(Y), • linki (Y, Z), and • τ(X)/r:c ∃ fi(τ(Y), τ(Z)). The addition of the filter, made possible by the protection types, distinguishes the

  16. 75 FR 26815 - AdvisorShares Investments, LLC and AdvisorShares Trust; Notice of Application

    Science.gov (United States)

    2010-05-12

    ... replace any Deposit Security or Redemption Security that is a to-be-announced transaction (``TBA Transaction''). A TBA transaction is a method of trading mortgage-backed securities. In a TBA Transaction, the... amount of substituted cash in the case of TBA Transactions will be equivalent to the value of the TBA...

  17. Transactional sex as a form of child sexual exploitation and abuse in Rwanda: implications for child security and protection.

    Science.gov (United States)

    Williams, Timothy P; Binagwaho, Agnes; Betancourt, Theresa S

    2012-04-01

    To illuminate the different manifestations of transactional sexual exploitation and abuse among Rwanda's children in order to inform effective responses by policies, programs, and communities. Qualitative data was collected during April and May 2010. One-hundred and thirty-nine adults (56% female) and 52 children (60% female) participated in focus groups across three geographic locations in Rwanda. Eleven interviews were held with child protection stakeholders. Interview and focus group participants reported how children, primarily girls, engaged in transactional sex as a survival strategy in response to situations of adversity including economic deprivation, difficulty accessing school, and social pressure. Policy and programs should work to address the underlying social and economic determinants of transactional sexual exploitation through structural interventions that reduce gender inequalities to accessing school and securing basic needs. Further quantitative and qualitative research to better understand the complexities of this issue is warranted. Copyright © 2012 Elsevier Ltd. All rights reserved.

  18. Security aspects and radiological protection analyzed in the Semi-industrial irradiation plant in Peru

    International Nuclear Information System (INIS)

    Del Valle O, C.

    1996-01-01

    The safety aspects and the radiological protection analyzed on regular and emergency operation of a multipurpose irradiation plant PIMU are shown. All its design requirements are described following a strict safety philosophy. The plant is classified into the generic category IV for storage in pool panoramic irradiators. This paper studies every aspect related to a safety operation of the gamma's facility, PIMU, being used as reference in order to obtain the corresponding licensing. Aspects related to the regular and safety operation of the whole plant are taken into account, so all the possible emergency cases and their respective answers will be known, analyzing cases and causes of accidents, as well as references to the program of radiological protection. Registers and documents are written in order to be used at the plant, all the lineament for the development of a good preventive and corrective maintenance are given, observing all the necessary adjustments. A list of the principal examinations of the technical condition of the plant is presented. (author). 2 refs

  19. Knowledge representation and knowledge base design for operator advisor system

    International Nuclear Information System (INIS)

    Hangos, K.M.; Sziano, T.; Tapolcai, L.

    1990-01-01

    The problems of knowledge representation, knowledge base handling and design has been described for an Operator Advisor System in the Paks Nuclear Power Plant. The Operator Advisor System is to be implemented as a part of the 5th and 6th unit. The knowledge of the Operator Advisor system is described by a few elementary knowledge items (diagnostic event functions, fault graph, action trees), weighted directed graphs have been found as their common structure. List-type and relational representation of these graphs have been used for the on-line and off-line part of the knowledge base respectively. A uniform data base design and handling has been proposed which consists of a design system, a knowledge base editor and a knowledge base compiler

  20. Communication with the public in radiation protection or nuclear safety and security

    International Nuclear Information System (INIS)

    Sabol, J.; Sestak, B.

    2014-01-01

    Traditionally, the public perceives any peaceful application of atomic and nuclear physics as something very dangerous. It is not easy to eliminate the public's memories of nuclear bombings in Japan towards the end of World War II and subsequent nuclear weapons tests which resulted in spreading radioactive fallout across the globe. The current use of radiation and nuclear technologies in industry, medicine, science and other fields is known to meet very strict international safety standards ensuring the adequate protection of people's health and the minimization of threat to the environment. The paper summarizes the current problems in communicating radiation and nuclear safety to members of the public and focuses on the importance of using appropriate approaches as well as relevant terminology, including quantities and units for the realistic assessment of radiological exposure. (authors)

  1. Identity Theft and Protecting Service Member’s Social Security Numbers

    Science.gov (United States)

    2009-04-01

    AND ENDNOTES……………………………………………………………….39 iv List of Tables Table 1: Reports of Data Breaches 2006-2008…………………………………………………25 v AU/ACSC... data breach such as that in the VA as well as the GAO report, it is that individuals must be vigilant in protecting their information. Knowing the...breach totals from 2006 to 2008. From 2006 to 2008 government database breaches decreased by 50%. Table 1: Reports of Data Breaches 2006-2008

  2. Solar Advisor Model User Guide for Version 2.0

    Energy Technology Data Exchange (ETDEWEB)

    Gilman, P.; Blair, N.; Mehos, M.; Christensen, C.; Janzou, S.; Cameron, C.

    2008-08-01

    The Solar Advisor Model (SAM) provides a consistent framework for analyzing and comparing power system costs and performance across the range of solar technologies and markets, from photovoltaic systems for residential and commercial markets to concentrating solar power and large photovoltaic systems for utility markets. This manual describes Version 2.0 of the software, which can model photovoltaic and concentrating solar power technologies for electric applications for several markets. The current version of the Solar Advisor Model does not model solar heating and lighting technologies.

  3. The Home, the Family and the Energy Advisor

    DEFF Research Database (Denmark)

    Tjørring, Lise

    within. The empirical focus is on the households' potential to perform energy renovations of their homes and adopt flexible electricity use. Four papers investigate what characterises the social and gendered engagements among the home, the family and the energy advisor and the implications...... events, social relations, historical conditions and social status. These findings call for new methods to increase the number of energy renovations and the likelihood of adopting flexible electricity use. We must focus on the home not only as a technical issue that can be improved but also as a dwelling...... space that contains gendered practices, cultural norms and social engagements among the home, the family and the energy advisor....

  4. 33 CFR 1.05-5 - Marine Safety and Security Council.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Marine Safety and Security... SECURITY GENERAL GENERAL PROVISIONS Rulemaking § 1.05-5 Marine Safety and Security Council. The Marine Safety and Security Council, composed of senior Coast Guard officials, acts as policy advisor to the...

  5. Cyber security risk management: public policy implications of correlated risk, imperfect ability to prove loss, and observability of self-protection.

    Science.gov (United States)

    Oğüt, Hulisi; Raghunathan, Srinivasan; Menon, Nirup

    2011-03-01

    The correlated nature of security breach risks, the imperfect ability to prove loss from a breach to an insurer, and the inability of insurers and external agents to observe firms' self-protection efforts have posed significant challenges to cyber security risk management. Our analysis finds that a firm invests less than the social optimal levels in self-protection and in insurance when risks are correlated and the ability to prove loss is imperfect. We find that the appropriate social intervention policy to induce a firm to invest at socially optimal levels depends on whether insurers can verify a firm's self-protection levels. If self-protection of a firm is observable to an insurer so that it can design a contract that is contingent on the self-protection level, then self-protection and insurance behave as complements. In this case, a social planner can induce a firm to choose the socially optimal self-protection and insurance levels by offering a subsidy on self-protection. We also find that providing a subsidy on insurance does not provide a similar inducement to a firm. If self-protection of a firm is not observable to an insurer, then self-protection and insurance behave as substitutes. In this case, a social planner should tax the insurance premium to achieve socially optimal results. The results of our analysis hold regardless of whether the insurance market is perfectly competitive or not, implying that solely reforming the currently imperfect insurance market is insufficient to achieve the efficient outcome in cyber security risk management. © 2010 Society for Risk Analysis.

  6. An Iraq C-130 Aviation Advisor Mission and Lessons for the Future

    National Research Council Canada - National Science Library

    Bauer, Michael J

    2007-01-01

    .... A review of lessons learned from the initial Iraq C-130 advisor mission provided insights into challenges stemming from differences in United States advisors and Iraqi airmen in language, culture...

  7. The American Military Advisor: Dealing with Senior Foreign Officials in the Islamic World

    National Research Council Canada - National Science Library

    Metrinko, Michael J

    2008-01-01

    "The American Military Advisor: Dealing with Senior Foreign Officials in the Islamic World" is a comprehensive guide for American military officers assigned as advisors to regional officials in places very different from the United States...

  8. Impacts of the Events on the 11. of September 2001 in the United States on Radiation Protection, the Nuclear Waste Management and the Nuclear Security in Germany

    International Nuclear Information System (INIS)

    Krumbach, H.; Steinmetz, H.J.; Odoj, R.

    2009-01-01

    This report describes the effects of the terrorist attacks of the 11 September 2001, when four airliners hijacked and crashed. These attacks take effects on radiation protection, nuclear disposal and nuclear safety in Germany. Some of the measures, which where taken after the September 11, 2001 in order to improve the safety of nuclear installations are presented in the following. The taken measures increasing security against terrorist attacks are also exemplarily described in this report. The examples include the introduction of new identity papers, which offer a higher security level as well as the prohibition of carrying liquids with more than 100 ml in the hand luggage. Also the human security measures taken by different companies since the attack happened are subject of the contribution. Due to the necessary confidentiality regarding the threat scenarios and the taken protective measures detailed descriptions of the measures in this report are limited. (authors)

  9. 78 FR 15962 - Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection-DHS/CBP...

    Science.gov (United States)

    2013-03-13

    ... Fax; Business Web site address; Business history; Physical Address(es); Mailing Address(es); Owner... Protection's Customs-Trade Partnership Against Terrorism program. Businesses accepted into the program... on higher risk businesses and thereby assists the agency in achieving its mission to secure the...

  10. ABOUT THE SPECIAL INVESTIGATIONS OF THE PROTECTION OF THE TECHNICAL SECURITY SYSTEMS AGAINST INFORMATION LEAKAGE DUE TO THE ACOUSTO-ELECTRICAL TRANSFORMATIONS

    Directory of Open Access Journals (Sweden)

    A. P. Durakovskiy

    2016-12-01

    Full Text Available None of the critically important facilities can operate without the engineered safety system. Functionally varied security networks or a fire alarm system can refer to this system as well as safety and reliability which are provided by secured energy, water and heating supply. In the process of attestation according to the requirements of information security of information objects with such technical means, it is necessary to conduct special investigations of protection against leakage of acoustic speech information through the channels of the acousto-electrical transformations (AET. There are major aspects in the data leak via AET, which currently include the following: lack of and /or obtaining legal and safety norms to regulate specified parameters; lack of the automated hardware and software system for some AET variations to carry out measurements; lack of specified safety equipment for some AET variations; lack of shelter security units; high costs of AET measurement and control units; and low measurement repeatability.

  11. TEACHER-ADVISORS: Where There's a Skill There's A Way.

    Science.gov (United States)

    Tamminen, Armas; And Others

    This report discusses a program to present the Teacher Advisement Training Model. This model for training teacher-advisors is based on the assumption that tentative commitment to making school a more rewarding experience for all is the first step in starting an effective program. The approach is to help teachers learn specific skills and methods…

  12. The perceived roles and functions of school science subject advisors

    African Journals Online (AJOL)

    The science subject advisor can play an important role in upgrading ... literature study highlighted practices in the UK and the US that are ... South Africa has recently adopted a strate- ... (North West Province) felt that a solution to their teaching problems ..... teachers, clustering of schools, practical work, cross teaching,.

  13. Trends in Defamation Law: Let the Advisor Beware.

    Science.gov (United States)

    King, Robert D.

    1992-01-01

    Although most lawsuits brought by students against a college are grounded on contract and due process theories, courts have been willing to consider students' defamation suits using tort theories. Recent changes in defamation law have engendered increased litigation and risk of liability for faculty and advisors. (Author/MSE)

  14. Design and Implementation of an Experimental Cataloging Advisor--Mapper.

    Science.gov (United States)

    Ercegovac, Zorana; Borko, Harold

    1992-01-01

    Describes the design of an experimental computer-aided cataloging advisor, Mapper, that was developed to help novice users with the descriptive cataloging of single-sheet maps from U.S. publishers. The human-computer interface is considered, the use of HyperCard is discussed, the knowledge base is explained, and assistance screens are described.…

  15. LIA: An Intelligent Advisor for E-Learning

    Science.gov (United States)

    Capuano, Nicola; Gaeta, Matteo; Marengo, Agostino; Miranda, Sergio; Orciuoli, Francesco; Ritrovato, Pierluigi

    2009-01-01

    Intelligent e-learning systems have revolutionized online education by providing individualized and personalized instruction for each learner. Nevertheless, until now very few systems were able to leave academic laboratories and be integrated into real commercial products. One of these few exceptions is the Learning Intelligent Advisor (LIA)…

  16. The Use of Images in Intelligent Advisor Systems.

    Science.gov (United States)

    Boulet, Marie-Michele

    This paper describes the intelligent advisor system, named CODAMA, used in teaching a university-level systems analysis and design course. The paper discusses: (1) the use of CODAMA to assist students to transfer theoretical knowledge to the practical; (2) details of how CODAMA is applied in conjunction with a computer-aided software engineering…

  17. Training Mentors as Educational Advisors for Adult Learners. Process Manual.

    Science.gov (United States)

    Singer, Elizabeth W.

    Materials used by the director of a project designed to assist key personnel in businesses, industries, and agencies with the educational counseling of their employees are presented. The objectives of the project, "Training Mentors as Educational Advisors of Adult Learners," were to: (1) provide two training sessions in educational…

  18. Risk Management in College Fraternities: Guidance from Two Faculty Advisors

    Science.gov (United States)

    Rosenberg, Stuart; Mosca, Joseph

    2016-01-01

    Students who become members of fraternities and sororities avail themselves of significant opportunities that enrich their college life. Faculty advisors play an important role in assisting fraternities and sororities in shaping students' leadership, scholastic, and personal development. Given the risks such as alcohol use and hazing that continue…

  19. Supply Chain Security: U.S. Customs and Border Protection has Enhanced its Partnership with Import Trade Sectors by Challenges Remain in Verifying Security Practices

    National Research Council Canada - National Science Library

    Caldwell, Stephen L; Fossett, Christine A; Conrad, Christopher; Berbsteub, Amy; Berry, Fredrick; Camarillo, Yecenia; Cook, Frances; David, Katherine; Dye, Wendy; Gibson, Nkenge

    2008-01-01

    .... For example, between March 2005 and November 2007, CBP established requirements for C-TPAT members in nine trade sectors to meet minimum security criteria for their specific trade sector, including...

  20. The Advisor and Instructor as a Dynamic Duo: Academic Motivation and Basic Psychological Needs

    Science.gov (United States)

    Burt, Tracie D.; Young-Jones, Adena D.; Yadon, Carly A.; Carr, Michael T.

    2013-01-01

    Students learn in and out of a formal classroom, and instructors and academic advisors play key roles in academic motivation and learning. Therefore, through the lens of self-determination theory, we examined the ways perceived support from instructors and advisors relates to satisfaction of college students' basic psychological needs. Advisor and…

  1. Principle Of Non-Regression And Social Security: Security And Trust Protection, Reservation Of The Possible And Non-Regression In The Fundamental Social Rights

    Directory of Open Access Journals (Sweden)

    Rodrigo Garcia Schwarz

    2016-12-01

    Full Text Available This paper aims to explain and analyze, from the perspective of the material and effective dimensions of fundamental social rights, questions that concern the relevance of security and trust for the social pact and, as a consequence, to the non-regression in the fundamental social rights in general and in the social security in particular. It reveals that, while the retrogression is not absolute, retrogression must be fully justified. The research is descriptive and explanatory, documentary-bibliographical.

  2. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  3. 75 FR 51609 - Classified National Security Information Program for State, Local, Tribal, and Private Sector...

    Science.gov (United States)

    2010-08-23

    ... within that agency. Sec. 2. Policy Direction. With policy guidance from the National Security Advisor and... of other agencies and representatives of SLTPS entities, as nominated by any Committee member and...

  4. P50/P90 Analysis for Solar Energy Systems Using the System Advisor Model: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Dobos, A. P.; Gilman, P.; Kasberg, M.

    2012-06-01

    To secure competitive financing for a solar energy generation project, the economic risk associated with interannual solar resource variability must be quantified. One way to quantify this risk is to calculate exceedance probabilities representing the amount of energy expected to be produced by a plant. Many years of solar radiation and metereological data are required to determine these values, often called P50 or P90 values for the level of certainty they represent. This paper describes the two methods implemented in the National Renewable Energy Laboratory's System Advisor Model (SAM) to calculate P50 and P90 exceedance probabilities for solar energy projects. The methodology and supporting data sets are applicable to photovoltaic, solar water heating, and concentrating solar power (CSP) systems.

  5. Radiation Protection Officer certification scheme. Malaysian experience

    International Nuclear Information System (INIS)

    Pungut, Noraishah; Razali, Noraini; Mod Ali, Noriah

    2011-01-01

    In Malaysia, the need for maintaining competency in radiation protection is emerging, focusing on the qualification of Radiation Protection Officers (RPO). Regulation 23 of Malaysian Radiation Protection (Basic Safety Standards) Regulations 1988, requires the applicant to employ an RPO, with the necessary knowledge, skill and training, enabling effective protection of individuals and minimizing danger to life, property and the environment for all activities sought to be licensed. An RPO must demonstrate the knowledge required, by attending RPO courses organised by an accredited agency and pass the RPO certification examination. Maintaining a high level of competency is crucial for future development of safe applications of ionising radiation. The major goal of training is to provide essential knowledge and skills and to foster correct attitudes on radiation protection and safe use of radiation sources. Assessment of the competency is through theoretical and practical examination. A standard criterion on the performance of the individuals evaluated has been established and only those who meet this criterion can be accepted as certified RPO. The National Committee for the Certification of Radiation Protection Officer (NCCRPO), comprising experts in various fields, is responsible to review and update requirements on competency of a certified RPO. With increasing number of candidates (i.e. 701 in 2008) and the international requirement for radioactive source security, it is incumbent upon the NCCRPO to improve the syllabus of the certification scheme. The introduction of a Radiation Protection Advisor (RPA) to provide service and advice to the radiation industry in Malaysia is also seriously considered. (author)

  6. Saudi Arabia’s Counterterrorism Methods: A Case Study on Homeland Security

    Science.gov (United States)

    2017-06-01

    Approved for public release. Distribution is unlimited. SAUDI ARABIA’S COUNTERTERRORISM METHODS: A CASE STUDY ON HOMELAND SECURITY Majed M...examined in the previous chapter with examples from the case studies related to terrorist attacks and Saudi Arabia’s responses. Furthermore, the...COUNTERTERRORISM METHODS: A CASE STUDY ON HOMELAND SECURITY by Majed M. Bin Madhian June 2017 Thesis Advisor: James Russell Co-Advisor

  7. Training need analysis for energy efficiency advisors and data bank of available training programs (9255 U 965)

    International Nuclear Information System (INIS)

    Lail, K.S.

    1995-01-01

    Development of a skill profile for an 'energy efficiency advisor' position, and production of a data base of available training programs undertaken by the Power Acquisition department of B.C. Hydro, were described. Driving forces for products and services at competitive prices and transition factors crucial to successful market positioning were outlined, along with future plans for securing a foothold in British Columbia. Desirable market oriented management principles and dynamic competitive marketing strategies were noted. It was concluded that the progression toward market-based dynamics would make changes occur more quickly and would require the introduction of tailored products and services

  8. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  9. Intelligent data retrieval in the industry experience advisor expert system

    International Nuclear Information System (INIS)

    Swisshelm, J.D.

    1991-01-01

    ABB Impell Corporation developed a prototype expert system called the Industry Experience Advisor for Florida Power and Light Company. This expert system assists plant engineers in evaluating design changes against previous nuclear industry experience. Previous experience is in the form of root causes or lessons learned of past events. The root-cause statements were developed from an engineering review of important event documents [US Nuclear Regulatory Commission information notices (INs) and information bulletins (IBs) and the Institute of Nuclear Power Operations safety evaluation reports and significant operating experience reports]. This paper describes the project that is currently expanding the prototype into a production system for use at a nuclear plant site. The Industry Experience Advisor should be ready for production release by the end of 1991. It will include knowledge of important events through 1990. In 1992 and in each following year, an update will be released adding the previous year's events

  10. Perspectives on the Science Advisor Program at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Bennett, P.C.; Heath, R.B.; Podlesny, A.; Channon, P.A.

    1992-01-01

    This paper discusses a Science Advisor Program which has been established at Sandia National Laboratories (SNL) for the long term augmentation of math and science instruction in New Mexico schools. Volunteer SNL engineers and scientists team with the faculty of participating schools to enhance the teachers' abilities to capture and hold the student's scientific imagination and develop their scientific skills. This is done primarily through providing laboratory resources, training the teachers how to use those resources, and advising how to obtain them in the future. In its first year, over 140 advisors teamed with 132 schools, for average weekly contact with 500 teachers and 10,000 students. Surveys indicate a general rise in frequency and quality of hands-on science instruction, as well as teacher and student attitudes. An expanded evaluation is planned for subsequent years

  11. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: A privacy-protecting remote access system for health-related research and evaluation☆

    Science.gov (United States)

    Jones, Kerina H.; Ford, David V.; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J.; Heaven, Martin L.; Thayer, Daniel S.; McNerney, Cynthia L.; Lyons, Ronan A.

    2014-01-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. PMID:24440148

  12. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: a privacy-protecting remote access system for health-related research and evaluation.

    Science.gov (United States)

    Jones, Kerina H; Ford, David V; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J; Heaven, Martin L; Thayer, Daniel S; McNerney, Cynthia L; Lyons, Ronan A

    2014-08-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. Copyright © 2014 The Aurthors. Published by Elsevier Inc. All rights reserved.

  13. Education and training of the shift technical advisor

    International Nuclear Information System (INIS)

    Thomas, E.L.

    1981-01-01

    This paper discusses the background and current approaches for qualifying the required position of Shift Technical Advisor (STA). Industry positions regarding the regulation are given. Problems associated with meeting the requirement are identified, along with a discussion of other alternatives for upgrading the education level of shift management. Inherent in the discussion is the conclusion that voluntary improvements in the training and education of shift management personnel are more effective than mandatory positions or degree requirements

  14. Innovative protection and control systems for a reliable and secure operation of electrical transmission systems; Innovative Schutz- und Leitsysteme zur zuverlaessigen und sicheren elektrischen Energieuebertragung

    Energy Technology Data Exchange (ETDEWEB)

    Mueller, Sven C.; Kubis, Adreas; Rehtanz, Christian [Technische Univ. Dortmund (Germany). Inst. fuer Energiesysteme, Energieeffizienz und Energiewirtschaft (ie3); Brato, Sebastian; Goetze, Juergen [Technische Univ. Dortmund (Germany). Arbeitsgebiet Datentechnik

    2012-07-01

    The integration of European electricity markets as well as the increasing power feed-in by renewable energy sources pose new challenges to the operation of electrical transmission systems. Modern protection and control systems based on wide-area information can substantially contribute to a reliable and secure system operation even against the background of future demands. In this paper research advances regarding new applications for wide-area monitoring, protection and control as well as an integrated simulation for power and ICT systems are presented that have been developed in the course of DFG research unit FOR1511 at TU Dortmund. (orig.)

  15. A Survey of the doctrine of protection responsibility in the Islamic legal system with emphasis on the national security

    Directory of Open Access Journals (Sweden)

    Hossein Sartipi

    2015-04-01

    Full Text Available In spite of that international community have seen very huge progress in different aspects of international law , especially in humanitarian law , but unfortunately it is in front of a lot of big crisis yet ; these crisis had attacked the body, wealth and security of many humans and also had attacked the authority and national security of many countries. Insufficiency of humanitarian introversion and its contrary with international regulations and also insufficiency of international security had forced international jurists to open new notions as the responsibility to protect in international area. according to this theory that criticized in the articles of 138 and 139 of the 2005 world summit outcome , each country has the responsibility to protect of it nationals against Genocide , war crimes , race cleansing and crimes against humanity an in the case of failure of responsible country , international community through united nation organization has responsibility to protect of humanity by restore to peaceful diplomatic and humanitarian instruments including other peaceful instruments mentioned in the sixth and seventh chapter of the charter of the united nations against Genocide , war crimes , race cleansing and crimes against humanity . The Security Council and some countries based their actions of intervention on the responsibility to protect in the crisis such as Sudan, Iraq, former Yugoslavia and Georgia. This theory that commenced during 90th decade recognized by the 2005 and 2009 world summit outcome and also welcomed by the international community has very strong bases in Islamic rules and we can find some roots for it in holy Qur'an and holy prophets jurisprudence. it is obvious that the acceptance and applying with the responsibility to protect or non observance to it ,will influence the national and international security. جامعه بین‌المللی به‌رغم پیشرفت‌های شگرفی که در عرصه‌های

  16. An implementation of a security infrastructure compliant with the Italian Personal Data Protection Code in a web-based cooperative work system.

    Science.gov (United States)

    Eccher, Claudio; Eccher, Lorenzo; Izzo, Umberto

    2005-01-01

    In this poster we describe the security solutions implemented in a web-based cooperative work frame-work for managing heart failure patients among different health care professionals involved in the care process. The solution, developed in close collaboration with the Law Department of the University of Trento, is compliant with the new Italian Personal Data Protection Code, issued in 2003, that regulates also the storing and processing of health data.

  17. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  18. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  19. Constructing vulnerabilty and protective measures indices for the enhanced critical infrastructure protection program.

    Energy Technology Data Exchange (ETDEWEB)

    Fisher, R. E.; Buehring, W. A.; Whitfield, R. G.; Bassett, G. W.; Dickinson, D. C.; Haffenden, R. A.; Klett, M. S.; Lawlor, M. A.; Decision and Information Sciences; LANL

    2009-10-14

    The US Department of Homeland Security (DHS) has directed its Protective Security Advisors (PSAs) to form partnerships with the owners and operators of assets most essential to the Nation's well being - a subclass of critical infrastructure and key resources (CIKR) - and to conduct site visits for these and other high-risk assets as part of the Enhanced Critical Infrastructure Protection (ECIP) Program. During each such visit, the PSA documents information about the facility's current CIKR protection posture and overall security awareness. The primary goals for ECIP site visits (DHS 2009) are to: (1) inform facility owners and operators of the importance of their facilities as an identified high-priority CIKR and the need to be vigilant in light of the ever-present threat of terrorism; (2) identify protective measures currently in place at these facilities, provide comparisons of CIKR protection postures across like assets, and track the implementation of new protective measures; and (3) enhance existing relationships among facility owners and operators; DHS; and various Federal, State, local tribal, and territorial partners. PSAs conduct ECIP visits to assess overall site security; educate facility owners and operators about security; help owners and operators identify gaps and potential improvements; and promote communication and information sharing among facility owners and operators, DHS, State governments, and other security partners. Information collected during ECIP visits is used to develop metrics; conduct sector-by-sector and cross-sector vulnerability comparisons; identify security gaps and trends across CIKR sectors and subsectors; establish sector baseline security survey results; and track progress toward improving CIKR security through activities, programs, outreach, and training (Snyder 2009). The data being collected are used in a framework consistent with the National Infrastructure Protection Plan (NIPP) risk criteria (DHS 2009). The

  20. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  1. Big data-based data mining modeling for nuclear security analysis in the modified physical protection system

    International Nuclear Information System (INIS)

    Woo, Tae Ho

    2014-01-01

    In this study, the social networking-related strategies have been developed to prepare against the terror. The conventional PPS is composed of detection, delay, and response. In the systems, each stage has particular characteristics where the detection state is to find out the intrusion and unauthorized behavior by some devices, the delay stage is to slow the malicious acts by some barriers, and finally the response stage is to interrupt the actions by several kinds of methods like the arms response. It is said there are some data mining activities by the department of homeland security in the United States. The Automated Targeting System (ATS) compares several factors like traveler, cargo, and conveyance information against intelligence and other enforcement data, which is managed by U.S. Customs and Border Protection (CBP) and includes modules for inbound (ATS-N) and outbound (ATS-AT) cargo, land border crossings (ATS-L), and passengers (ATS-P). The Data Analysis and Research for Trade Transparency System (DARTTS) analyzes possible data like the trade and financial stuff, which is administered by U.S. Immigration and Customs Enforcement (ICE).The modeling has accomplished successfully the random number generation-based quantifications for nuclear security incorporated with several complex algorithms, which is one of popular strategies in the technological-social science areas. In the calculations, the data are processed in every 7.5 minutes in which this means the calculation is done as 8 times in one hour. So, the graph has 100 hours with 800 times data processing. This means that 35,673.516 graphs are available by the big data processing. That is, 1 tera byte = 1,000,000,000,000 bytes = 800 2,500,000,000 bytes So, it is needed to process 2,500,000,000 bytes more for 1 tera byte. In the similar way, 2,500,000,000 bytes are done for 8 times in 1 hour. Then, 312,500,000 bytes are done for 24 hours in 1 day. Then, 13,020,833.33 bytes are done for 365 days in 1 year

  2. Big data-based data mining modeling for nuclear security analysis in the modified physical protection system

    Energy Technology Data Exchange (ETDEWEB)

    Woo, Tae Ho [Systemix Global Co. Ltd, Seoul (Korea, Republic of)

    2014-10-15

    In this study, the social networking-related strategies have been developed to prepare against the terror. The conventional PPS is composed of detection, delay, and response. In the systems, each stage has particular characteristics where the detection state is to find out the intrusion and unauthorized behavior by some devices, the delay stage is to slow the malicious acts by some barriers, and finally the response stage is to interrupt the actions by several kinds of methods like the arms response. It is said there are some data mining activities by the department of homeland security in the United States. The Automated Targeting System (ATS) compares several factors like traveler, cargo, and conveyance information against intelligence and other enforcement data, which is managed by U.S. Customs and Border Protection (CBP) and includes modules for inbound (ATS-N) and outbound (ATS-AT) cargo, land border crossings (ATS-L), and passengers (ATS-P). The Data Analysis and Research for Trade Transparency System (DARTTS) analyzes possible data like the trade and financial stuff, which is administered by U.S. Immigration and Customs Enforcement (ICE).The modeling has accomplished successfully the random number generation-based quantifications for nuclear security incorporated with several complex algorithms, which is one of popular strategies in the technological-social science areas. In the calculations, the data are processed in every 7.5 minutes in which this means the calculation is done as 8 times in one hour. So, the graph has 100 hours with 800 times data processing. This means that 35,673.516 graphs are available by the big data processing. That is, 1 tera byte = 1,000,000,000,000 bytes = 800 2,500,000,000 bytes So, it is needed to process 2,500,000,000 bytes more for 1 tera byte. In the similar way, 2,500,000,000 bytes are done for 8 times in 1 hour. Then, 312,500,000 bytes are done for 24 hours in 1 day. Then, 13,020,833.33 bytes are done for 365 days in 1 year

  3. Multilayered security and privacy protection in Car-to-X networks solutions from application down to physical layer

    CERN Document Server

    Stübing, Hagen

    2013-01-01

    Car-to-X (C2X) communication in terms of Car-to-Car (C2C) and Car-to-Infrastructure (C2I) communication aims at increasing road safety and traffic efficiency by exchanging foresighted traffic information. Thereby, security and privacy are regarded as an absolute prerequisite for successfully establishing the C2X technology on the market. Towards the paramount objective of covering the entire ITS reference model with security and privacy measures, Hagen Stübing develops dedicated solutions for each layer, respectively. On application layer a security architecture in terms of a Public Key Infras

  4. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  5. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  6. Inspection methods for physical protection Task III review of other agencies' physical security activities for research reactors

    International Nuclear Information System (INIS)

    In Task I of this project, the current Nuclear Regulatory Commission (NRC) position-on physical security practices and procedures at research reactors were reviewed. In the second task, a sampling of the physical security plans was presented and the three actual reactor sites described in the security plans were visited. The purpose of Task III is to review other agencies' physical security activities for research reactors. During this phase, the actions, procedures and policies of two domestic and two foreign agencies other than the NRC that relate to the research reactor community were examined. The agencies examined were: International Atomic Energy Agency; Canadian Atomic Energy Control Board; Department of Energy; and American Nuclear Insurers

  7. Returning to Our Small Wars Roots: Preparing Marine Advisors to Help Other Lands Meet Future Threats

    Science.gov (United States)

    2012-04-26

    1918 uprising. Not surprisingly, the best qualified Marines like Smedley Butler were sent to France, adding to these challenges. When confronted... Robert S. McNamara authorized advisors for each province and advisory teams for each combat battalion. In addition to the increased role advisors...University of Pennsylvania Press, 2009), 51. 17 Ibid, 40. 18 Ibid. 19 Ramsey III, Robert D., Advising Indigenous Forces: American Advisors in

  8. Communicating Health Risks under Pressure: Homeland Security Applications

    International Nuclear Information System (INIS)

    Garrahan, K.G.; Collie, S.L.

    2006-01-01

    The U.S. Environmental Protection Agency's (EPA) Office of Research and Development (ORD) Threat and Consequence Assessment Division (TCAD) within the National Homeland Security Research Center (NHSRC) has developed a tool for rapid communication of health risks and likelihood of exposure in preparation for terrorist incidents. The Emergency Consequence Assessment Tool (ECAT) is a secure web-based tool designed to make risk assessment and consequence management faster and easier for high priority terrorist threat scenarios. ECAT has been designed to function as 'defensive play-book' for health advisors, first responders, and decision-makers by presenting a series of evaluation templates for priority scenarios that can be modified for site-specific applications. Perhaps most importantly, the risk communication aspect is considered prior to an actual release event, so that management or legal advisors can concur on general risk communication content in preparation for press releases that can be anticipated in case of an actual emergency. ECAT serves as a one-stop source of information for retrieving toxicological properties for agents of concern, estimating exposure to these agents, characterizing health risks, and determining what actions need to be undertaken to mitigate the risks. ECAT has the capability to be used at a command post where inputs can be checked and communicated while the response continues in real time. This front-end planning is intended to fill the gap most commonly identified during tabletop exercises: a need for concise, timely, and informative risk communication to all parties. Training and customization of existing chemical and biological release scenarios with modeling of exposure to air and water, along with custom risk communication 'messages' intended for public, press, shareholders, and other partners enable more effective communication during times of crisis. For DOE, the ECAT could serve as a prototype that would be amenable to

  9. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  10. The purpose of United Nations Security Council practice: Contesting competence claims in the normative context created by the Responsibility to Protect.

    Science.gov (United States)

    Ralph, Jason; Gifkins, Jess

    2017-09-01

    Practice theory provides important insights into the workings of the Security Council. The contribution is currently limited, however, by the conjecture that practice theory operates on 'a different analytical plane' to norm/normative theory. Building on existing critiques, we argue that analysing practices separately from normative positions risks misappropriating competence and reifying practice that is not fit for purpose. This risk is realized in Adler-Nissen and Pouliot's practice-based account of the Libya crisis. By returning the normative context created by the Responsibility to Protect to the analytical foreground, and by drawing on a pragmatic conception of 'ethical competence', we find that pre-reflexive practices uncritically accepted as markers of competence - for example, 'penholding' - can contribute to the Council's failure to act collectively in the face of mass atrocity. Drawing on extensive interview material, we offer an alternative account of the Libya intervention, finding that the practices of the permanent three (France, the UK and the US) did not cultivate the kind of collective consciousness that is required to implement the Responsibility to Protect. This is further illustrated by an account of the Security Council's failure in Syria, where the permanent three's insistence on regime change instrumentalized the Council at the expense of Responsibility to Protect-appropriate practice. This changed when elected members became 'penholders'. Practice theory can facilitate learning processes that help the Council meet its responsibilities, but only through an approach that combines its insights with those of norm/normative theory.

  11. Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets

    Science.gov (United States)

    Thaw, David Bernard

    2011-01-01

    Current scholarly understanding of information security regulation in the United States is limited. Several competing mechanisms exist, many of which are untested in the courts and before state regulators, and new mechanisms are being proposed on a regular basis. Perhaps of even greater concern, the pace at which technology and threats change far…

  12. Remote sensing evaluation of fire hazard : Towards operational tools for improving the security of citizens and protecting the environment

    NARCIS (Netherlands)

    Maffei, C.; Gambardella, C.; Menenti, M.

    2015-01-01

    Forest fires are a threat for both the environment and the security of citizens. This is particularly relevant in the Mediterranean, where the population density is high, and long dry summers drive vegetation into fireprone conditions. Policy makers underline the key role of prevention over damage

  13. Y-12 Groundwater Protection Program CY 2009 Triennial Report Of The Monitoring Well Inspection And Maintenance Program, Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-06-01

    This document is the triennial report for the Well Inspection and Maintenance Program of the Y- 12 Groundwater Protection Program (GWPP), at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report formally documents well inspection events conducted on active and inactive wells at Y-12 during calendar years (CY) 2007 through 2009; it documents well maintenance and plugging and abandonment activities completed since the last triennial inspection event (CY 2006); and provides summary tables of well inspection events, well maintenance events, and well plugging and abandonment events during the reference time period.

  14. SPECIAL AND MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS AS VITAL PART OF THE CRITICAL INFRASTRUCTURES IN ROMANIA. SECURING THEIR PHYSICAL AND INFORMATIONAL PROTECTION

    Directory of Open Access Journals (Sweden)

    Constantin MINCU

    2012-11-01

    Full Text Available The article presents several arguments on the need to study the critical infrastructure in Romania including various systems (networks and special military communications. It emphasizes the role and place of such systems and networks to provide national defense and security and the risks and vulnerabilities faced by these infrastructures, and some necessary measures to be taken for the physical and informational protection in the case of hostile military actions, natural disasters or other negative phenomena. Finally some conclusions and proposals are formulated.

  15. Security Information System Digital Simulation

    OpenAIRE

    Tao Kuang; Shanhong Zhu

    2015-01-01

    The study built a simulation model for the study of food security information system relay protection. MATLAB-based simulation technology can support the analysis and design of food security information systems. As an example, the food security information system fault simulation, zero-sequence current protection simulation and transformer differential protection simulation are presented in this study. The case studies show that the simulation of food security information system relay protect...

  16. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  17. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  18. Comparison of the students’ satisfaction about the performance of academic advisors before and after the advisor project in Shahrekord University of Medical Sciences

    Directory of Open Access Journals (Sweden)

    MASOUMEH DELARAM

    2014-01-01

    Full Text Available Introduction: Inappropriate advice interferes with the students’ achievement of educational and professional goals and they may fail to use proper resources for their educational needs. The present study was carried out to compare the students’ satisfaction about the performance of academic advisors before and after the advisor project in Shahrekord University of Medical Sciences. Methods: This longitudinal study was carried out using census report on 244 students in different courses at Shahrekord University of Medical Sciences in two stages at the first semester of 2010-2011 and first semester of 2011-2012. To collect the data, we used a self-designed questionnaire including individual and educational information and 10 multiple-choice questions with Likert scale to assess the students’ satisfaction about the advisors’ performance. Data were analyzed in SPSS 14 using paired t-test, qui-square test. P<0.05 was considered significant. Results: Of the ten items of satisfaction, there was only a significant difference in “accessibility to an advisor before and after the advisor project in students of nursing and midwifery school” (p=0.010, and the difference was not significant in other items in these students. No significant difference was found in ten items of satisfaction in students at other schools before and after the advisor project (p=0.010. Conclusion: It seems that the implementation of advisor project could not provide a satisfactory position for students. Adequate supervision of university officials on proper implementation of the advisor project, supporting faculty advisors and strengthening their position can help to improve the process.

  19. A Preliminary Report of Advisor Perceptions of Advising and of a Profession

    Science.gov (United States)

    Aiken-Wisniewski, Sharon A.; Johnson, Anna; Larson, Joshua; Barkemeyer, Jason

    2015-01-01

    Practicing advisors may not agree, know, or understand that advising does not meet the scholarly definition of a profession. Through a phenomenological study, members of NACADA: The Global Community for Academic Advising were invited to describe the position of academic advisor. The data gathered were used to address two research questions:…

  20. Industrial-Organizational and Human Factors Graduate Program Admission: Information for Undergraduate Advisors

    Science.gov (United States)

    Shoenfelt, Elizabeth L.; Stone, Nancy J.; Kottke, Janet L.

    2015-01-01

    Many psychology departments do not have industrial-organizational (IO) or human factors (HF) faculty members. As such, potential IO and HF graduate students may miss career opportunities because faculty advisors are unfamiliar with the disciplines and their graduate programs. To assist advisors, this article highlights the content of IO and HF…

  1. Perceptions of Effectiveness and Job Satisfaction of Pre-Law Advisors

    Science.gov (United States)

    Knotts, H. Gibbs; Wofford, Claire B.

    2017-01-01

    Despite playing an important role, preprofessional advising has received little research attention. For this study, 313 U.S. preprofessional advisors were surveyed in 2015. Drawing on work adjustment and social cognitive career theories, we analyzed the job satisfaction and perceived effectiveness of pre-law advisors. The major findings reveal…

  2. 78 FR 11865 - President's Board of Advisors on Historically Black Colleges and Universities

    Science.gov (United States)

    2013-02-20

    .... Brown, Jr., White House Initiative on Historically Black Colleges and Universities, U.S. Department of... DEPARTMENT OF EDUCATION President's Board of Advisors on Historically Black Colleges and Universities AGENCY: U.S. Department of Education, President's Board of Advisors on Historically Black Colleges...

  3. 78 FR 14297 - President's Board of Advisors on Historically Black Colleges and Universities

    Science.gov (United States)

    2013-03-05

    ... DEPARTMENT OF EDUCATION President's Board of Advisors on Historically Black Colleges and... Board of Advisors on Historically Black Colleges and Universities scheduled for March 6, 2013, and... for a date to be announced in the future. FOR FURTHER INFORMATION CONTACT: John P. Brown, Designated...

  4. 76 FR 60564 - President's Council of Advisors on Science and Technology; Notice of Meeting: Open Regional...

    Science.gov (United States)

    2011-09-29

    ... development. Facility and infrastructure sharing. Policies that could create a fertile innovation environment...; Notice of Meeting: Open Regional Meeting of the President's Council of Advisors on Science and Technology... schedule and summary agenda for an open regional meeting of the President's Council of Advisors on Science...

  5. Undergraduate Students' Perceptions of the Communication Behaviors of Their Advisors and Perceptions of Relational Satisfaction

    Science.gov (United States)

    Punyanunt-Carter, Narissra; Carter, Stacy

    2015-01-01

    This study examined the specific interpersonal communication styles and behaviors of advisors and the expectations they have on their advisee's level of satisfaction, as well as what characteristics lead to higher relational satisfaction in the advisor-advisee relationship. A combination of convenience and snowball sampling were utilized to obtain…

  6. GSA Advisors' Self-Efficacy Related to LGBT Youth of Color and Transgender Youth

    Science.gov (United States)

    Poteat, V. Paul; Scheer, Jillian R.

    2016-01-01

    Gay-Straight Alliances (GSAs) serve lesbian, gay, bisexual, transgender (LGBT) and heterosexual youth from diverse backgrounds. Although some attention has been given to youth members in general, little attention has been given to adult advisors. Among 47 GSA advisors from 33 high schools (39 cisgender female, 8 cisgender male), the authors…

  7. Explaining Doctoral Students' Relational Maintenance with Their Advisor: A Psychosocial Development Perspective

    Science.gov (United States)

    Goldman, Zachary W.; Goodboy, Alan K.

    2017-01-01

    This study explored how psychosocial development affects doctoral students' relationship and communication with their advisor. Chickering and Reisser's vectors of psychosocial development were examined in the doctoral context to understand how students preserve communicatively satisfying relationships with their advisor through the use of…

  8. Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225/Revision 5): Recommendations

    International Nuclear Information System (INIS)

    2011-01-01

    This publication, Revision 5 of Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225), is intended to provide guidance to States and their competent authorities on how to develop or enhance, implement and maintain a physical protection regime for nuclear material and nuclear facilities, through the establishment or improvement of their capabilities to implement legislative and regulatory programmes. The recommendations presented in this publication reflect a broad consensus among IAEA Member States on the requirements which should be met for the physical protection of nuclear materials and nuclear facilities.

  9. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  10. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  11. Development of risk-oriented methods for evaluating the reliability of protective barriers security objects with highly radioactive sources

    International Nuclear Information System (INIS)

    Skalozubov, V.I.; Vashchenko, V.N.; Zlochevskij, V.V.

    2012-01-01

    The paper discusses an alternative approach is the definition of probabilistic safety indicators NPP, based on estimates of the probability of failure of protective safety barriers under the influence of fatigue mechanisms of degradation of

  12. [Legislative and legal security of supervisory activities in the sphere of protection of consumers' rights and human well-being].

    Science.gov (United States)

    Rumiantsev, G I; Kutsenko, G I; Polesskiĭ, V A

    2007-01-01

    Sanitary legislation plays an important role in supervisory activities ensuring the protection of consumers' rights and human well-being. The paper considers the basic laws and standard acts allowing for legal regulation in this sphere of activities.

  13. Food security and the nutritional status of children in foster care: new horizons in the protection of a fragile population.

    Science.gov (United States)

    Ferrara, Pietro; Scancarello, Marta; Khazrai, Yeganeh M; Romani, Lorenza; Cutrona, Costanza; DE Gara, Laura; Bona, Gianni

    2016-10-12

    The nutritional status of foster children, the quality of daily menus in group homes and the Food Security inside these organizations have been poorly studied and this study means to investigate them. A sample of 125 children, ranging in age from 0-17 years, among seven group homes (group A) was compared with 121 children of the general population we (group B). To evaluate nutritional status, BMI percentiles were used. Mean percentiles of both groups were compared through statistical analysis. Both nutritional and caloric daily distributions in each organization were obtained using the 24-hour recall method. A specific questionnaire was administered to evaluate Food Security. From the analysis of mean BMI-for-age (or height-for-length) percentiles, did not observe statistically significant differences between group A and group B. The average daily nutrient and calorie distribution in group homes proves to be nearly optimal with the exception of a slight excess in proteins and a slight deficiency in PUFAs. Moreover, a low intake of iron and calcium was revealed. All organizations obtained a "High Food Security" profile. Nutritional conditions of foster children are no worse than that of children of the general population. Foster care provides the necessary conditions to support their growth.

  14. Challenge theme 7: Information support for management of border security and environmental protection: Chapter 9 in United States-Mexican Borderlands: Facing tomorrow's challenges through USGS science

    Science.gov (United States)

    Parcher, Jean W.; Page, William R.

    2013-01-01

    Historically, international borders were located far from the major political and economic capitals of their countries and rarely received adequate planning or infrastructure development. Today, as a result of global economics and increased movement of goods between nations, border regions play a much greater role in commerce, tourism, and transportation. For example, Mexico is the second largest destination for United States exports (Woodrow Wilson Center Mexico Institute, 2009). The rapid population and economic growth along the United States–Mexican border, undocumented human border crossings, and the unique natural diversity of resources in the Borderlands present challenges for border security and environmental protection. Assessing risks and implementing sustainable growth policies to protect the environment and quality of life greatly increase in complexity when the issues cross an international border, where social services, environmental regulations, lifestyles, and cultural beliefs are unique for each country. Shared airsheds, water and biological resources, national security issues, and disaster management needs require an integrated binational approach to assess risks and develop binational management strategies.

  15. System Advisor Model: Flat Plate Photovoltaic Performance Modeling Validation Report

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, Janine [National Renewable Energy Lab. (NREL), Golden, CO (United States); Whitmore, Jonathan [National Renewable Energy Lab. (NREL), Golden, CO (United States); Kaffine, Leah [National Renewable Energy Lab. (NREL), Golden, CO (United States); Blair, Nate [National Renewable Energy Lab. (NREL), Golden, CO (United States); Dobos, Aron P. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2013-12-01

    The System Advisor Model (SAM) is a free software tool that performs detailed analysis of both system performance and system financing for a variety of renewable energy technologies. This report provides detailed validation of the SAM flat plate photovoltaic performance model by comparing SAM-modeled PV system generation data to actual measured production data for nine PV systems ranging from 75 kW to greater than 25 MW in size. The results show strong agreement between SAM predictions and field data, with annualized prediction error below 3% for all fixed tilt cases and below 8% for all one axis tracked cases. The analysis concludes that snow cover and system outages are the primary sources of disagreement, and other deviations resulting from seasonal biases in the irradiation models and one axis tracking issues are discussed in detail.

  16. Shift technical advisors: in the eyes of the NRC

    International Nuclear Information System (INIS)

    Crocker, L.P.

    1981-01-01

    Since January 1, 1980, the NRC has required that Shift Technical Advisors be on-shift at all operating nuclear power plants. The objective of the requirement is to assure that technical expertise is immediately available to each operating shift to assess off-normal events and to provide advice to control room personnel. Further, this advice and assistance is to be provided by an individual not responsible for control manipulations or for directing the activities of reactor operators. The long-term requirement for on-shift technical expertise is firm. However, the exact manner in which this expertise must be furnished has not been determined. Licensees have proposed various alternatives to meet this requirement. These proposals still are being reviewed by the NRC staff

  17. Rapid repair advisor for motor-operated valves

    International Nuclear Information System (INIS)

    Somsel, J.K.

    1991-01-01

    This paper reports on the initial proposed application for the Rapid Repair Advisor project for motor-operated valves (MOVs). The expected benefits from an MOV testing expert system depend on the purpose of the testing. Straight acceptance testing (post-maintenance and surveillance) could benefit from field verification of test validity. Troubleshooting of failed operators is seldom difficult. Intermittent problems are difficult to resolve suggesting that trace recording capabilities are needed. Predictive diagnosis places the most demands on the interpretive skills of the engineer. However, the limit to predictive capabilities seems to lie in the design of the MOV and the measurable parameters. Utilities are expected to require a knowledgeable MOV maintenance engineer to make decisions on MOV maintenance and operability. The economics of developing an expert system are comparable to improved training for the end-users

  18. Academic involvement in shift technical advisor training for the utilities

    International Nuclear Information System (INIS)

    Davidson, J.N.; Sain, L.H.

    1981-01-01

    One of the clearest conclusions reached of nearly every commission and panel formed in response to the Three Mile Island accident was the desirability of upgrading the educational background of those persons with direct operational responsibility in a nuclear power plant. The long term objective is for all shift supervisors to have engineering degrees as well as NRC senior operating licenses. In the interim, the utilities are required to provide in-depth engineering expertise on every shift in the person of a Shift Technical Advisor (STA). The training of STA's is complicated by the requirement to have college level instruction in plant specific topics which are not typically included in the curricula of degree-granting instructions. One possible response to this challenge is presented

  19. Multi-Center Traffic Management Advisor Operational Field Test Results

    Science.gov (United States)

    Farley, Todd; Landry, Steven J.; Hoang, Ty; Nickelson, Monicarol; Levin, Kerry M.; Rowe, Dennis W.

    2005-01-01

    The Multi-Center Traffic Management Advisor (McTMA) is a research prototype system which seeks to bring time-based metering into the mainstream of air traffic control (ATC) operations. Time-based metering is an efficient alternative to traditional air traffic management techniques such as distance-based spacing (miles-in-trail spacing) and managed arrival reservoirs (airborne holding). While time-based metering has demonstrated significant benefit in terms of arrival throughput and arrival delay, its use to date has been limited to arrival operations at just nine airports nationally. Wide-scale adoption of time-based metering has been hampered, in part, by the limited scalability of metering automation. In order to realize the full spectrum of efficiency benefits possible with time-based metering, a much more modular, scalable time-based metering capability is required. With its distributed metering architecture, multi-center TMA offers such a capability.

  20. Recent Updates to the System Advisor Model (SAM)

    Energy Technology Data Exchange (ETDEWEB)

    DiOrio, Nicholas A [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2018-02-14

    The System Advisor Model (SAM) is a mature suite of techno-economic models for many renewable energy technologies that can be downloaded for free as a desktop application or software development kit. SAM is used for system-level modeling, including generating performance pro the release of the code as an open source project on GitHub. Other additions that will be covered include the ability to download data directly into SAM from the National Solar Radiation Database (NSRDB) and up- dates to a user-interface macro that assists with PV system sizing. A brief update on SAM's battery model and its integration with the detailed photovoltaic model will also be discussed. Finally, an outline of planned work for the next year will be presented, including the addition of a bifacial model, support for multiple MPPT inputs for detailed inverter modeling, and the addition of a model for inverter thermal behavior.

  1. The Northern States Power Company welding manual advisor

    International Nuclear Information System (INIS)

    Lu, Yi; Wood, R.M.

    1993-01-01

    The Welding Manual Advisor (WMA) is an object oriented expert system designed to assist Northern States Power (NSP) personnel in implementing the company's Welding Manual. The expert system captures the knowledge of welding experts, addresses important issues in welding activities and automates the use of the Welding Manual. It is estimated that use of the WMA will save $81,000 over the next six years at NSP, because of the reduction of labor and errors in the use of the Welding Manual, and facilitation of training of NSP personnel. The important features of the WMA include the accuracy and consistency in determining welding procedure and requirements, update capability, user friendly interface, on-line help function, back-up capability, and well-documented manuals

  2. Resilient Communication: A New Crisis Communication Strategy for Homeland Security

    Science.gov (United States)

    2012-03-01

    communication theory. Author, Timothy Coombs , in Ongoing Crisis Communication , discusses the need for a crisis management 10 plan to prepare for potential... COMMUNICATION : A NEW CRISIS COMMUNICATION STRATEGY FOR HOMELAND SECURITY by Sharon L. Watson March 2012 Thesis Advisor: Christopher Bellavita...REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Resilient Communication : A New Crisis Communication

  3. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  4. Y-12 Groundwater Protection Program Extent Of The Primary Groundwater Contaminants At The Y-12 National Security Complex

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2013-12-01

    This report presents data summary tables and maps used to define and illustrate the approximate lateral extent of groundwater contamination at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee. The data tables and maps address the primary (i.e., most widespread and mobile) organic, inorganic, and radiological contaminants in the groundwater. The sampling locations, calculated contaminant concentrations, plume boundary values, and paired map format used to define, quantify, delineate, and illustrate the approximate extent of the primary organic, inorganic, and radiological contaminants in groundwater at Y-12 are described.

  5. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  6. Protective

    Directory of Open Access Journals (Sweden)

    Wessam M. Abdel-Wahab

    2013-10-01

    Full Text Available Many active ingredients extracted from herbal and medicinal plants are extensively studied for their beneficial effects. Antioxidant activity and free radical scavenging properties of thymoquinone (TQ have been reported. The present study evaluated the possible protective effects of TQ against the toxicity and oxidative stress of sodium fluoride (NaF in the liver of rats. Rats were divided into four groups, the first group served as the control group and was administered distilled water whereas the NaF group received NaF orally at a dose of 10 mg/kg for 4 weeks, TQ group was administered TQ orally at a dose of 10 mg/kg for 5 weeks, and the NaF-TQ group was first given TQ for 1 week and was secondly administered 10 mg/kg/day NaF in association with 10 mg/kg TQ for 4 weeks. Rats intoxicated with NaF showed a significant increase in lipid peroxidation whereas the level of reduced glutathione (GSH and the activity of superoxide dismutase (SOD, catalase (CAT, glutathione S-transferase (GST and glutathione peroxidase (GPx were reduced in hepatic tissues. The proper functioning of the liver was also disrupted as indicated by alterations in the measured liver function indices and biochemical parameters. TQ supplementation counteracted the NaF-induced hepatotoxicity probably due to its strong antioxidant activity. In conclusion, the results obtained clearly indicated the role of oxidative stress in the induction of NaF toxicity and suggested hepatoprotective effects of TQ against the toxicity of fluoride compounds.

  7. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  8. Norms Versus Security: What is More Important to Japan’s View of Nuclear Weapons

    Science.gov (United States)

    2017-03-01

    SECURITY : WHAT IS MORE IMPORTANT TO JAPAN’S VIEW OF NUCLEAR WEAPONS? by Calvin W. Dillard March 2017 Thesis Advisor: S. Paul Kapur Second...TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE NORMS VERSUS SECURITY : WHAT IS MORE IMPORTANT TO JAPAN’S VIEW OF NUCLEAR WEAPONS... security concerns and technology are important in determining whether a nation will create a weapons program while politics, economics, and security

  9. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data

    Directory of Open Access Journals (Sweden)

    Eduard J. Beck

    2016-11-01

    Full Text Available Background: As increasing amounts of personal information are being collected through a plethora of electronic modalities by statutory and non-statutory organizations, ensuring the confidentiality and security of such information has become a major issue globally. While the use of many of these media can be beneficial to individuals or populations, they can also be open to abuse by individuals or statutory and non-statutory organizations. Recent examples include collection of personal information by national security systems and the development of national programs like the Chinese Social Credit System. In many low- and middle-income countries, an increasing amount of personal health information is being collected. The collection of personal health information is necessary, in order to develop longitudinal medical records and to monitor and evaluate the use, cost, outcome, and impact of health services at facility, sub-national, and national levels. However, if personal health information is not held confidentially and securely, individuals with communicable or non-communicable diseases (NCDs may be reluctant to use preventive or therapeutic health services, due to fear of being stigmatized or discriminated against. While policymakers and other stakeholders in these countries recognize the need to develop and implement policies for protecting the privacy, confidentiality and security of personal health information, to date few of these countries have developed, let alone implemented, coherent policies. The global HIV response continues to emphasize the importance of collecting HIV-health information, recently re-iterated by the Fast Track to End AIDS by 2030 program and the recent changes in the Guidelines on When to Start Antiretroviral Therapy and on Pre-exposure Prophylaxis for HIV. The success of developing HIV treatment cascades in low- and middle-income countries will require the development of National Health Identification Systems. The

  10. Protecting the confidentiality and security of personal health information in low- and middle-income countries in the era of SDGs and Big Data.

    Science.gov (United States)

    Beck, Eduard J; Gill, Wayne; De Lay, Paul R

    2016-01-01

    As increasing amounts of personal information are being collected through a plethora of electronic modalities by statutory and non-statutory organizations, ensuring the confidentiality and security of such information has become a major issue globally. While the use of many of these media can be beneficial to individuals or populations, they can also be open to abuse by individuals or statutory and non-statutory organizations. Recent examples include collection of personal information by national security systems and the development of national programs like the Chinese Social Credit System. In many low- and middle-income countries, an increasing amount of personal health information is being collected. The collection of personal health information is necessary, in order to develop longitudinal medical records and to monitor and evaluate the use, cost, outcome, and impact of health services at facility, sub-national, and national levels. However, if personal health information is not held confidentially and securely, individuals with communicable or non-communicable diseases (NCDs) may be reluctant to use preventive or therapeutic health services, due to fear of being stigmatized or discriminated against. While policymakers and other stakeholders in these countries recognize the need to develop and implement policies for protecting the privacy, confidentiality and security of personal health information, to date few of these countries have developed, let alone implemented, coherent policies. The global HIV response continues to emphasize the importance of collecting HIV-health information, recently re-iterated by the Fast Track to End AIDS by 2030 program and the recent changes in the Guidelines on When to Start Antiretroviral Therapy and on Pre-exposure Prophylaxis for HIV . The success of developing HIV treatment cascades in low- and middle-income countries will require the development of National Health Identification Systems. The success of programs like

  11. The regulatory infrastructure for radiation protection, the safety of radiation sources and security of radioactive materials in Ethiopia

    International Nuclear Information System (INIS)

    Gebeyehu Wolde, G.

    2003-01-01

    The application of Nuclear Techniques in Ethiopia started in the early sixties in the medical field and through time has gradually expanded to other areas. Following this growth the practice of Radiation Protection in Ethiopia dates back over 15 years. Radiation Protection Legislation 79/1993 was promulgated in December 1993, which has established an Autonomous Regulatory Authority to control and supervise the introduction and conduct of any practice involving ionizing radiation. Since 1998 the National Radiation Protection Authority has made a remarkable progress in terms of building a National Radiation Protection Infrastructure and is in a full swing transformation process towards a dynamic credible and competent regulatory Authority. The regulatory activities are designed in line with the main regulatory instruments, Notification, Authorization, Inspection and Enforcement. NRPA has a national inventory system and fully implemented the Regulatory Authority Information System (RAIS), which provides a systemic integration and will be instrumental to enhance the effectiveness of the regulatory system. A substantial progress has been made in the development and provision of support and technical services in the areas of Metrology and Calibration Services, Instrument Maintenance Service, Individual Monitoring of Personnel, Environmental and Food Monitoring and Interim Storage Facility for spent sources. Development of a national system for emergency preparedness and response is the current top agenda of NRPA. Towards ensuring an effective radiation protection and regulatory programme, NRPA is also making a proactive involvement in, expanding its outreach, information dissemination, awareness promotion and development of key human resources. In the last four years Ethiopia has been actively co-operating with IAEA in the framework of the Regional Model Projects RAF/9/024, RAF/9/028 and RAF/9/029. The inputs received through the project framework coupled with the

  12. A macro-economic framework for evaluation of cyber security risks related to protection of intellectual property.

    Science.gov (United States)

    Andrijcic, Eva; Horowitz, Barry

    2006-08-01

    The article is based on the premise that, from a macro-economic viewpoint, cyber attacks with long-lasting effects are the most economically significant, and as a result require more attention than attacks with short-lasting effects that have historically been more represented in literature. In particular, the article deals with evaluation of cyber security risks related to one type of attack with long-lasting effects, namely, theft of intellectual property (IP) by foreign perpetrators. An International Consequence Analysis Framework is presented to determine (1) the potential macro-economic consequences of cyber attacks that result in stolen IP from companies in the United States, and (2) the likely sources of such attacks. The framework presented focuses on IP theft that enables foreign companies to make economic gains that would have otherwise benefited the U.S. economy. Initial results are presented.

  13. A Sensitive ANN Based Differential Relay for Transformer Protection with Security against CT Saturation and Tap Changer Operation

    OpenAIRE

    KHORASHADI-ZADEH, Hassan; LI, Zuyi

    2014-01-01

    This paper presents an artificial neural network (ANN) based scheme for fault identification in power transformer protection. The proposed scheme is featured by the application of ANN to identifying system patterns, the unique choice of harmonics of positive sequence differential currents as ANN inputs, the effective handling of current transformer (CT) saturation with an ANN based approach, and the consideration of tap changer position for correcting secondary CT current. Performanc...

  14. CRITERIA FOR CONSULTANT AND ADVISOR IN THE BRAZILIAN POSTGRADUATE SYSTEM.

    Science.gov (United States)

    Petroianu, Andy

    2015-01-01

    To review the rules, resolutions and existing documents relating to consultant and advisor to better target the actions of those who exercise these roles. The following documents were consulted: Statute of CAPES, through Decree No. 7692 of March 2, 2012; Ordinance No. 47 of 17/10/1995; Opinion 977 1965 Newton Sucupira; Area Document of Medicine III; Interministerial Ordinance 251 of 2012, based on Decree No. 7642 of 2011 of the Ministry of Science and Technology; CAPES Regiment. The Brazilian Postgraduate system is divided in two different fields, according to its aspects: the "lato sensu" postgraduate, defined as all professional studies performed after the high school graduation; and the "stricto sensu" postgraduate that includes the master degree and the doctorate, both of them different from what is known as MSc or MS and PhD. The Brazilian doctorate is recognized as academic because its purposes include to improve the scientific and the teaching levels of university docents. The master degree has two different objectives one is to be academic and similar to the doctorate; the other is to upgrade professionals to a higher level than specialist or MBA and is denominated professional master degree. The master degrees and the doctorate are designated as courses and may be put together in a structure known as stricto sensu postgraduate program. The complexity of these courses and programs in all the areas of the superior human knowledge requires a large number of professional directly involved with this system and other professionals that attend them, called consultants and advisors. The consultants are counselors, and the advisors are assistants, both of them legally established with the incumbency to aid the postgraduate staff in all their duties. Nothing prevents a person from being a consultant on the situation and advisor on another, even in the same institution. Have knowledge about what being a consultant and advisor is required to exercise the function

  15. The IRSN's scientific strategy for the progress of nuclear safety, nuclear security and radiation protection

    International Nuclear Information System (INIS)

    2015-12-01

    This publication defines the new strategy of the IRSN to fulfil its role in nuclear safety, in the protection of mankind and of the environment against ionizing radiations, and in the protection of nuclear materials, installations and transports against malevolent acts. The IRSN is also involved in public information, and as an actor and a partner in the definition of other major public policies such as research and innovation, work health or environmental health. In a first part, the report highlights these missions, the current evolution of the international scientific, technological and economic context, and briefly evokes the major scientific challenges for the next decade. The second part highlights the abilities and capacities of the IRSN to support scientific approaches and works. The main orientations are then formulated and commented: to justify scientific orientation backgrounds and means to assign, to associate final recipients to research works, to implement initiatives to develop national, European and international cooperation in the field of nuclear and radiological risks, to develop academic partnerships and to participate to national research alliances, to develop collaboration with industries, nuclear operators and actors of the medical sector, to possess tools to perform numeric simulation, to guarantee the access for the Institute to research and experimentation infrastructures and data bases, to develop methodologies and tools for aid to decision, to perpetuate knowledge and know-how for a better renewal of risk assessment. The report then presents the main questions of interest regarding radiation protection and nuclear safety

  16. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  17. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  18. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  19. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  20. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  1. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  2. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  3. Standard format and content for a licensee physical security plan for the protection of special nuclear material of moderate or low strategic significance - January 1980

    International Nuclear Information System (INIS)

    Anon.

    1981-01-01

    This guide describes the information required in the physical security plan submitted as part of an application for a license to possess, use, or transport special nuclear material (SNM) of moderate strategic significance or 10 kg or more of SNM of low strategic significance and recommends a standard format for presenting the information in an orderly arrangement. This standards format will thus serve as an aid to uniformity and completeness in the preparation and review of the physical protection plan of the license application. This document can also be used as guidance by licensees possessing or transporting less than 10 kg of SNM of low strategic significance in understanding the intent and implementing the requirements of paragraphs 73.67(a), 73.67(f), and 73.67(g) of 10 CRF Part 73

  4. Y-12 Groundwater Protection Program CY2012 Triennial Report Of The Monitoring Well Inspection And Maintenance Program Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-09-01

    This document is the triennial report for the Well Inspection and Maintenance Program of the Y- 12 Groundwater Protection Program (GWPP), at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report formally documents well inspections completed by the GWPP on active and inactive wells at Y-12 during calendar years (CY) 2010 through 2012. In addition, this report also documents well inspections performed under the Y-12 Water Resources Restoration Program, which is administered by URS|CH2M Oak Ridge (UCOR). This report documents well maintenance activities completed since the last triennial inspection event (CY 2009); and provides summary tables of well inspections and well maintenance activities during the reference time period.

  5. Groundwater Protection Program Management Plan for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2001-06-01

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of BWXT Y-12, L.L.C. (hereafter referenced as BWXT Y-12), the Y-12 management and operations (M and O) subcontractor for DOE.

  6. Community Security and Justice under United Nations Governance: Lessons from Chiefs’ Courts in South Sudan’s Protection of Civilians Sites

    Directory of Open Access Journals (Sweden)

    Rachel Ibreck

    2017-12-01

    Full Text Available This article examines the public authority of chiefs’ courts within the United Nations Mission in South Sudan (UNMISS Protection of Civilians Sites (PoCs. After December 2013, UNMISS peacekeepers opened the gates of their bases to around 200,000 civilians fleeing war. This unintentionally created a legal and political anomaly. Over time, conflicts and crimes rose within the sites, and UNMISS improvised a form of administration. But while the internationals sought technical solutions, people displaced within the sites turned to familiar ‘customary’ methods to manage problems of insecurity, establishing chiefs’ courts. The PoC sites became an arena of plural authorities, with chiefs working alongside camp administrators, peacekeepers and humanitarian actors. We explore how and why the chiefs responded to insecurity within the sites and whether they engaged with, or diverged from United Nations actors and international norms. We demonstrate that justice remains central to the provision of security in contexts of war and displacement. International peace interventions are rightly wary of ‘customary’ justice processes that prioritise communities and families at the expense of individual rights, but this unique case shows that they are sources of trust and consistency that are resilient, adaptable and can contribute to human security.

  7. Unfinished Business: Canada’s Contribution to Promoting Compliance with International Humanitarian Law Through the Protection of Civilians in Armed Conflict Agenda of the United Nations Security Council

    Directory of Open Access Journals (Sweden)

    Joelle A. Martin

    2009-10-01

    Full Text Available During its 1999-2000 term on the United Nations Security Council, Canada helped launch the Council’s “Protection of Civilians in Armed Conflict” agenda. This aimed to reduce civilian war casualties through better respect for international humanitarian law [IHL]. This article reviews the agenda’s origins and evolution ten years on. The authors focus on Canada’s contributions in increasing the Council’s efforts to protect civilians, with three main assertions. First, Canada had a key role in creating and promoting the agenda, an important IHL initiative. Second, the agenda is well established in the Council’s work, but needs further effort to ensure greater impact in specific situations. Third, Canada could develop the agenda and improve respect for IHL if it joins the Security Council for the 2011-2012 term, picking up its “unfinished business” from its last Council term. Pendant son mandat de 1999-2000 au Conseil de Sécurité de l’ONU, le Canada a aidé à lancer le programme « La protection des civils dans les conflits armés » du Conseil. Le but était de réduire le nombre de victimes civiles de la guerre en faisant respecter davantage le droit international humanitaire [DIH]. Cet article passe en revue l’origine du programme et son évolution après dix années. Les auteurs portent leur attention sur les contributions du Canada pour augmenter les efforts du Conseil en vue de la protection des civils, en faisant trois affirmations principales. D’abord, le Canada a joué un rôle-clé dans la création et la promotion du programme, une initiative importante de DIH. Deuxièmement, le programme est bien établi au sein du travail du Conseil, mais nécessite des efforts additionnels afin d’assurer plus d’impact dans des situations particulières. Troisièmement, le Canada pourrait développer le programme et améliorer le respect du DIH s’il devient membre du Conseil de Sécurité pour 2011- 2012 lui permettant de

  8. People, Process, and Policy: Case Studies in National Security Advising, the National Security Council, and Presidential Decision Making

    Science.gov (United States)

    2017-06-01

    confirmation of Lake’s concerns with the administration’s public relations failures, David Gergen, the president’s communications advisor, increased... Public Affairs: 389-395. 75 these positions, he did not openly object too them during the campaign. Additionally, as this case study shows, he...PEOPLE, PROCESS, AND POLICY: CASE STUDIES IN NATIONAL SECURITY ADVISING, THE NATIONAL SECURITY COUNCIL, AND PRESIDENTIAL DECISION MAKING

  9. 77 FR 53941 - Emerging Global Advisors, LLC, et al.;

    Science.gov (United States)

    2012-09-04

    ...'s portfolio as a result of the rebalancing of its Underlying Index (any such change, a ``Rebalancing... within the meaning of section 2(a)(3) of the Act. 3. Each Fund will consist of a portfolio of securities (``Portfolio Securities'') selected to correspond generally to the performance of an Underlying Index. No...

  10. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  11. Foreign Security Force Advisor Training, Doctrine, and Manning for 2015 and Beyond

    Science.gov (United States)

    2016-03-01

    physical and metaphysical environment, and ways to mitigate stressors.  Social Perspective Taking 2 hour class—Gain an understanding of how a foreign...Recognize Cultural Stress 1 hour class—Recognizing stressors in a physical and metaphysical environment, and ways to mitigate stressors. Don’t Recall N

  12. Are South African financial advisor addressing the estate planning objectives that are important to their client?

    Directory of Open Access Journals (Sweden)

    Venter, J.M.P.

    2014-07-01

    Full Text Available Estate planning is an important aspect of any effective financial plan. When preparing an estate plan several objectives identified by the individual planner, as well as several pieces of legislation have to be considered. In South Africa the actions of financial advisors are regulated by the Financial Advisory and Intermediary Services Act. The act aims to ensure that the financial advisor act in the best interest of his / her client. If the act meets its set objectives there will be an alignment of objectives set by a financial advisor and his / her client. This study investigates the existence of an expectation gap between the estate planning objectives considered to be important by the financial advisor and the importance allocated to these factors by the clients. The study found that there was an expectation gap for three of the objectives that should be considered in the estate plan

  13. The App Squad: SLJ's Advisors Weigh in on Kids' Book Apps

    Science.gov (United States)

    Ishizuka, Kathy

    2011-01-01

    In this article, "School Library Journal's" ("SLJ") advisors talk about book apps for kids. They discuss what they like, what one should look for in discerning the best for kids and teens, and where this all might be headed.

  14. The CBT Advisor: An Expert System Program for Making Decisions about CBT.

    Science.gov (United States)

    Kearsley, Greg

    1985-01-01

    Discusses structure, credibility, and use of the Computer Based Training (CBT) Advisor, an expert system designed to help managers make judgements about course selection, system selection, cost/benefits, development effort, and probable success of CBT projects. (MBR)

  15. Securing a better future for all: Nuclear techniques for global development and environmental protection. NA factsheet on environment laboratories: Protecting the environment

    International Nuclear Information System (INIS)

    2012-01-01

    According to the Millennium Development Goals, managing the environment is considered an integral part of the global development process. The main purpose of the IAEA's environment laboratories is to provide Member States with reliable information on environmental issues and facilitate decision making on protection of the environment. An increasingly important feature of this work is to assess the impact of climate change on environmental sustainability and natural resources. The IAEA's environment laboratories use nuclear techniques, radionuclides, isotopic tracers and stable isotopes to gain a better understanding of the various marine processes, including locating the sources of pollutants and their fate, their transport pathways and their ultimate accumulation in sediments. Radioisotopes are also used to study bioaccumulation in organisms and the food chain, as well as to track signals of climate change throughout history. Natural and artificial radionuclides are used to track ocean currents in key regions. They are also used to validate models designed to predict the future impact of climate change and ocean acidification. The laboratories study the fate and impact of contamination on a variety of ecosystems in order to provide effective preventative diagnostic and remediation strategies. They enhance the capability of Member States to use nuclear techniques to understand and assess changes in their own terrestrial and atmospheric environments, and adopt suitable and sustainable remediation measures when needed. Since 1995, the IAEA environment laboratories have coordinated the international network of Analytical Laboratories for the Measurement of Environmental Radioactivity, providing accurate analysis in the event of an accident or an intentional release of radioactivity. In addition, the laboratories work alongside other organizations, such as UNESCO, the IOC, UNEP and the EC. The laboratories collaborate with Member States through direct involvement with

  16. Computer-Based Testing: Test Site Security.

    Science.gov (United States)

    Rosen, Gerald A.

    Computer-based testing places great burdens on all involved parties to ensure test security. A task analysis of test site security might identify the areas of protecting the test, protecting the data, and protecting the environment as essential issues in test security. Protecting the test involves transmission of the examinations, identifying the…

  17. System Advisor Model, SAM 2014.1.14: General Description

    Energy Technology Data Exchange (ETDEWEB)

    Blair, Nate [National Renewable Energy Lab. (NREL), Golden, CO (United States); Dobos, Aron P. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Freeman, Janine [National Renewable Energy Lab. (NREL), Golden, CO (United States); Neises, Ty [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wagner, Michael [National Renewable Energy Lab. (NREL), Golden, CO (United States); Ferguson, Tom [Global Resources, Northbrook, IL (United States); Gilman, Paul [National Renewable Energy Lab. (NREL), Golden, CO (United States); Janzou, Steven [Janzou Consulting, Idaho Springs, CO (United States)

    2014-02-01

    This document describes the capabilities of the U.S. Department of Energy and National Renewable Energy Laboratory's System Advisor Model (SAM), Version 2013.9.20, released on September 9, 2013. SAM is a computer model that calculates performance and financial metrics of renewable energy systems. Project developers, policy makers, equipment manufacturers, and researchers use graphs and tables of SAM results in the process of evaluating financial, technology, and incentive options for renewable energy projects. SAM simulates the performance of photovoltaic, concentrating solar power, solar water heating, wind, geothermal, biomass, and conventional power systems. The financial model can represent financial structures for projects that either buy and sell electricity at retail rates (residential and commercial) or sell electricity at a price determined in a power purchase agreement (utility). SAM's advanced simulation options facilitate parametric and sensitivity analyses, and statistical analysis capabilities are available for Monte Carlo simulation and weather variability (P50/P90) studies. SAM can also read input variables from Microsoft Excel worksheets. For software developers, the SAM software development kit (SDK) makes it possible to use SAM simulation modules in their applications written in C/C++, C#, Java, Python, and MATLAB. NREL provides both SAM and the SDK as free downloads at http://sam.nrel.gov. Technical support and more information about the software are available on the website.

  18. Scientific writing: strategies and tools for students and advisors.

    Science.gov (United States)

    Singh, Vikash; Mayer, Philipp

    2014-01-01

    Scientific writing is a demanding task and many students need more time than expected to finish their research articles. To speed up the process, we highlight some tools, strategies as well as writing guides. We recommend starting early in the research process with writing and to prepare research articles, not after but in parallel to the lab or field work. We suggest considering scientific writing as a team enterprise, which needs proper organization and regular feedback. In addition, it is helpful to select potential target journals early and to consider not only scope and reputation, but also decision times and rejection rates. Before submission, instructions to authors and writing guides should be considered, and drafts should be extensively revised. Later in the process editor's and reviewer's comments should be followed. Our tips and tools help students and advisors to structure the writing and publishing process, thereby stimulating them to develop their own strategies to success. Copyright © 2014 The International Union of Biochemistry and Molecular Biology.

  19. THE ROLE OF 'PROFESSIONAL ADVISORS ON FINANCIAL MATTERS' IN ENTREPRENEURIAL NETWORKS

    OpenAIRE

    KIM KLYVER; KEVIN HINDLE

    2010-01-01

    This study investigated the influence that 'professional advisors on financial matters' have in comparison with other people with whom entrepreneurs discuss their venture. Based on follow-up surveys completed in relation to the Danish participation in the Global Entrepreneurship Monitor (GEM) survey, it was found that professional advisors on financial matters only play a minor role in the two early phases of the entrepreneurial process before the venture is actually started. It was further r...

  20. March of the Robo-advisors : The potential for global expansion of digital asset management platforms

    OpenAIRE

    Rättyä, Jere

    2016-01-01

    This thesis looks into the robo-advisory market in the U.S. and Europe, with the goal of determining the international potential for a Finnish robo-advisor service and inspecting the interest of foreign service providers in the Finnish market. Fintech is becoming increasingly disruptive for the traditional and conservative financial sector, which has resulted in start-ups building their own robo-advisor platform around the world. Traditional wealth management is both expensive and exclusi...

  1. Soviet Advisors Group in South China and Soviet Union Financing of Gomindan War Planes in 1924

    Directory of Open Access Journals (Sweden)

    Александр Геннадьевич Юркевич

    2011-12-01

    Full Text Available The article dwells on the organization and activities of the Soviet advisors group, which assisted to the South China government of Sun Yatsen, its participation in financing Kuomintang political and military projects. The author pointed out that the main aim of the advisors group efforts was to form new Kuomintang power institutions and to bring its policy and army under control, for all that the tactics of implementation of strategy aim were constantly changing.

  2. Overview of security culture

    International Nuclear Information System (INIS)

    Matulanya, M. A.

    2014-04-01

    Nuclear Security culture concept has been aggressively promoted over the past several years as a tool to improve the physical protection of the nuclear and radioactive materials due to growing threats of catastrophic terrorism and other new security challenges. It is obvious that, the scope of nuclear security and the associated cultures need to be extended beyond the traditional task of protecting weapons-usable materials. The role of IAEA is to strengthen the nuclear security framework globally and in leading the coordination of international activities in this field. Therefore all governments should work closely with the IAEA to take stronger measures to ensure the physical protection, the safety and security of the nuclear and radioactive materials. In the effort to reflect this new realities and concerns, the IAEA in 2008 came up with the document, the Nuclear Security Culture, Nuclear Security Series No. 7, Implementing Guide to the member states which urged every member state to take appropriate measures to promote security culture with respect to nuclear and radioactive materials. The document depicted this cultural approach as the way to protect individual, society and the environment. Among other things, the document defined nuclear security culture as characteristics and attitudes in organizations and of individuals which establishes that, nuclear security issues receives attention warranted by their significance. (au)

  3. Android平台安全防护系统的设计与实现%Design and Implementation of the Android Platform Security Protection System

    Institute of Scientific and Technical Information of China (English)

    张楠; 滕英岩

    2015-01-01

    Research of safety protection software based on android platform,using Android SDK and Java Web technology to realize the function of the Android platform security protection system.The system supports mobile phone anti-theft retrieve,intercept,harassment,cache clearing virus scan function,realizes effective interception of malicious programs and harassment of background server program, written using servlet deployment in Baidu cloud platform,has characteristics of fast response and stable,brought to the after period of maintenance work great convenience.%研究基于Android平台的安全防护软件,使用Android SDK和Java Web技术实现了Android平台安全防护系统的各项功能。系统支持手机防盗找回、骚扰拦截、缓存清理、病毒扫描等功能,实现了对恶意程序和骚扰程序有效地拦截,后台服务器使用Servlet编写部署在百度云平台,拥有快速的响应和稳定等特点,给后期的维护工作带来的极大的便捷。

  4. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  5. Conservation on international boundaries: the impact of security barriers on selected terrestrial mammals in four protected areas in Arizona, USA.

    Directory of Open Access Journals (Sweden)

    Jamie W McCallum

    Full Text Available Several thousand terrestrial protected areas (PAs lie on international boundaries. Because international boundaries can be focal points for trade, illegal activity and development, such PAs can be vulnerable to a range of anthropogenic threats. There is an increasing trend towards the erection of international boundary infrastructure (including fences, barriers and ditches in many parts of the world, which may reduce the risk of these anthropogenic threats to some PAs. However this may restrict home range and access to resources for some native species. We sought to understand the impacts of these two different types of threat by using camera traps to measure the activity level of humans, native and invasive mammals in four US PAs on the Mexican international boundary. Comparisons were made between treatment areas with barriers and those without. Results showed that puma and coati were more likely to appear in treatment areas without barriers, whereas humans were not observed more frequently in one treatment area over another. The suggestion is that the intermittent fencing present in this part of the world does affect some native species, but does not necessarily restrict the movement of humans (including illegal migrants, who may negatively impact native species.

  6. The intelligence-security services and national security

    OpenAIRE

    Mijalković, Saša

    2011-01-01

    Since their inception, states have been trying to protect their vital interests and values more effectively, in which they are often impeded by other countries. At the same time, they seek to protect the internal order and security against the so-called internal enemy. Therefore, the states organize (national) security systems within their (state) systems, in which they form some specialized security entities. Among them, however, intelligence and security services are the ones that stand out...

  7. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  8. Using the acid rain advisor to evaluate compliance strategies

    International Nuclear Information System (INIS)

    Stallard, G.S.; Anderson, A.A.

    1991-01-01

    Unlike prior Clean Air Act (CAA) legislation, the most recent amendments will require utilities to reduce SO 2 and NO x emissions for existing operating power station and provides for compliance strategies in which emissions for existing operating power stations and provides for compliance strategies in which emission reductions can be transferred from one unit to another. The Electric Power Research Institute (EPRI), in conjunction with the Department of Energy (DOE), is funding the development of the Coal Quality Expert (CQE), a comprehensive analytical/planning tool to consider the myriad of potential coal purchase decisions now facing the utility, including fuel switching, blending, coal beneficiation, and the installation of retrofit emission controls. The CQE will be built on the foundation of proven, validated computer models to the maximum extent possible, including EPRI's Coal Quality Impact Model (CQIM), a state-of-the-art computer model designed to evaluate cost/performance impacts of fuel switching at existing power plants. In addition, as the CQE development permits, interim computer products will be offered. The first of these products is the Acid Rain Advisor (ARA). The ARA complements the CQIM by providing the ability to rapidly evaluate the system-wide cost and reduction benefits which result from selecting various reduction techniques on various units within the system. Thus, with the ARA, the utility can efficiently combine cost/performance information, view overall system results, and rapidly consider various 'What if' alternatives to ensure that individual unit reduction strategies are consistent with the goals of the utility as a whole. This paper demonstrates the capabilities of the ARA, and by use of a 'sample analysis,' illustrates how a utility might develop and evaluate alternative CAA compliance strategies

  9. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  10. Factors leading to the involvement of Forensic Advisors in the Belgian criminal justice system.

    Science.gov (United States)

    Bitzer, Sonja

    2018-04-01

    Forensic Advisors at the National Institute for Criminalistics and Criminology in Brussels act as advising body to the magistrate regarding analytical possibilities and the usefulness of trace analysis in a case. Initially, their function was devised to assist in complex murder cases with unknown offender. However, in a previous study, the increasing diversity of the cases they are requested for has been observed (Bitzer et al., in press). In order to deepen our understanding of the decision steps in the criminal investigation process, the decision to involve a Forensic Advisor and the factors leading to their involvement were evaluated. The study focused on homicide, robbery and burglary cases with and without requests for a Forensic Advisor between January 2014 and June 2016. The factors were categorised into five knowledge dimensions: strategic, immediate, physical, criminal and utility. Decision tree modelling was carried out in order to identify the factors influencing the request for a Forensic Advisor in the case. The decision to request a Forensic Advisor differs between different types of offences. It also depends on the complexity of the case in terms of the number of traces and objects collected at the crime scene, and the availability of witness reports. Indeed, Forensic Advisors take the role of trace analysis coordinator by providing an overview of all available traces, objects, analyses and results. According to the principal implication factors and the performed case study, the contribution of Forensic Advisors consists mainly in summarising all information and advise on potential additional analyses. This might be explained by a loss of overview of the information and the possibilities regarding trace analysis by the magistrate responsible of the case. Copyright © 2018 Elsevier B.V. All rights reserved.

  11. Phosphorus-32: practical radiation protection

    International Nuclear Information System (INIS)

    Ballance, P.E.; Morgan, J.

    1987-01-01

    This monograph offers practical advice to Radiation Protection Advisors, Radiation Protection Supervisors and Research Supervisors, together with research workers, particularly those in the field of molecular biological research. The subject is dealt with under the following headings: physical properties, radiation and measurement methods, radiation units, phosphorus metabolism and health risks, protection standards and practical radiation protection, administrative arrangements, accidents, decontamination, emergency procedures, a basic written system for radiochemical work, with specialised recommendations for 32 P, and guidance notes of accident situations involving 32 P. (U.K.)

  12. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  13. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  14. An Exploration of the Relationship between International Students and Their Advisors in U.S. Higher Education Institution

    OpenAIRE

    Mitra, Shreya

    2017-01-01

    International students in U.S. academic settings are facing barriers in the path of their academic accomplishments. In higher educational institutions, students work very closely with their academic advisors to solve a definite problem. Dependence on the academic advisor is much more when the advisee is international. Keeping these points in mind, one of the factors that might impact academic environment for an international student is the bonding that they share with their advisor. This rese...

  15. Groundwater Protection Program Management Plan for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC; Environmental Compliance Department Environment, Safety, and Health Division Y-12 National Security Complex

    2004-03-31

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of BWXT Y-12, L.L.C. (hereafter referenced as BWXT), the Y-12 management and operations (M&O) contractor for DOE. This GWPP management plan addresses the requirements of DOE Order 450.1 (BWXT Y12 S/RID) regarding the implementation of a site-wide approach for groundwater protection at each DOE facility. Additionally, this plan is a ''living'' document that is reviewed annually, revised and reissued every three years, and is formatted to provide for updating individual sections independent of the rest of the document. Section 2 includes a short description of the groundwater system at Y-12, the history of groundwater monitoring at Y-12 and the corresponding evolution of the GWPP, and an overview of ongoing Y-12 groundwater monitoring activities. Section 3 describes the key elements of the GWPP management strategy. Organizational roles and responsibilities of GWPP personnel are outlined in Section 4. Section 5 presents an overview of the GWPP project plans for applicable programmatic elements. Section 6 lists the reports, plans, and documents that are referenced for technical and administrative details.

  16. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  17. Patient protection in radiotherapy (Radio neurosurgery National Service of the Social Security Mexican Institute); Proteccion del paciente en radioterapia (Servicio Nacional de Radioneurocirugia del IMSS)

    Energy Technology Data Exchange (ETDEWEB)

    Espiritu R, R. [Centro Medico Nacional de Occidente, IMSS, Servicio Nacional de Radioneurocirugia, Belisario Dominguez 735, Sector Libertad, 44340 Guadalajara, Jalisco (Mexico)

    2008-12-15

    The perspective of patient protection at the Radio neurosurgery National Service of the Social Security Mexican Institute is divided into three parts: the testing program for equipment acceptance, an assurance quality program based on periodic tests, an also other assurance quality based on tests during the application. Among the technical aspects that influence in the equipment acceptance tests, it is the collimation type, the characteristics of the lineal accelerator, the platform for planning and the network type. In the case of the collimation system and the accelerator characteristics, we consider the manufacturer's specifications and requirements of Mexican Official Standard NOM-033-NUCL-1999, {sup T}echnical Specifications for the Teletherapy Units Operation, Linear Accelerators{sup .} Planning for the platform takes into account the manufacturer's specifications. In the case of computed tomography as well as review the calibration according to manufacturer's specifications should be considered the standard NOM-229-SSA1-2002. In the case of the linear accelerator must be the radiological characterization of radiation beam as part of this, the absolute dose determination. As for the periodic tests is verified the dose constancy, as well as the flattening and symmetry of X-rays beam. There are also tests battery with daily, monthly and yearly frequencies, which make up the assurance quality program. (Author)

  18. “SmartMonitor” — An Intelligent Security System for the Protection of Individuals and Small Properties with the Possibility of Home Automation

    Science.gov (United States)

    Frejlichowski, Dariusz; Gościewska, Katarzyna; Forczmański, Paweł; Hofman, Radosław

    2014-01-01

    “SmartMonitor” is an intelligent security system based on image analysis that combines the advantages of alarm, video surveillance and home automation systems. The system is a complete solution that automatically reacts to every learned situation in a pre-specified way and has various applications, e.g., home and surrounding protection against unauthorized intrusion, crime detection or supervision over ill persons. The software is based on well-known and proven methods and algorithms for visual content analysis (VCA) that were appropriately modified and adopted to fit specific needs and create a video processing model which consists of foreground region detection and localization, candidate object extraction, object classification and tracking. In this paper, the “SmartMonitor” system is presented along with its architecture, employed methods and algorithms, and object analysis approach. Some experimental results on system operation are also provided. In the paper, focus is put on one of the aforementioned functionalities of the system, namely supervision over ill persons. PMID:24905854

  19. Research project of P3 (Protected Plutonium Production) and global academy for 3S (Safety, Security, Safeguard) for peace and sustainable prosperity

    International Nuclear Information System (INIS)

    Saito, Masaki

    2013-01-01

    Full text:Nuclear engineering education has been initiated in 1957 at the graduate school of Tokyo Institute of Technology. Higher Educational activities have been conducted for more than half century. More than 1000 Master students and 200 Doctoral students graduated from the Department of Nuclear Engineering in Tokyo Institute of Technology. Many of them are working in nuclear industries and institutes. International course of nuclear engineering was initiated in 1994, and 130 students from 20 overseas countries have graduated from Master and Doctoral Programs. In the national research program, Protected Plutonium Production (P 3 ) has been proposed to enhance the proliferation resistance of plutonium by the transmutation of Minor Actinides (MAs). In 2011, Academy for Global Nuclear Safety and Security Agent was initiated with the unique features of a full boarding system and a curriculum that combines education in liberal arts and science/ engineering. Both educational and research programs have been supported by the Ministry of Education, Culture, Sports, Science and Technology in Japan. In the conference, the current nuclear educational and research activities in Tokyo Institute of Technology will be presented. (author)

  20. Information system of industrial security and environmental protection (SISPA) of PEMEX; Sistema de informacion de seguridad industrial y proteccion ambiental (SISPA) de PEMEX

    Energy Technology Data Exchange (ETDEWEB)

    Carrisoza B, Vicente; Bernal M, Hector M [Instituto de Investigaciones Electricas, Cuernavaca, Morelos (Mexico); Cortazar F, Segio [Petroleos Mexicanos (Mexico)

    2002-07-01

    The Management of Supervision of Processes (GSP) in collaboration with the Management of Control and Instrumentation (GCI) of the Instituto de Investigaciones Electricas (IIE), has developed a system able to respond in a opportune and coordinated way to the attention and handling of emergencies, optimization of the number of reports and its content, reduction of the time in which the reports of industrial security and environmental protection arrive at their destiny, diminution of the manual process in the elaboration of reports and information and, finally, able to automatically calculate the associated performance indicators related to the efficiency of actions in each one the involved areas. [Spanish] La Gerencia de Supervision de Procesos (GSP) en colaboracion con la Gerencia de Control e Instrumentacion (GCI) del Instituto de Investigaciones Electricas (IIE), ha desarrollado un sistema capaz de responder de manera oportuna y coordinada a la atencion y manejo de emergencias, optimizacion del numero de reportes y su contenido, reduccion del tiempo en que los reportes de seguridad industrial y proteccion ambiental llegan a su destino, disminucion del proceso manual en la elaboracion de reportes e informes y, finalmente, capaz de calcular automaticamente los indicadores de desempeno asociados a la eficiencia de las acciones en cada una las areas involucradas.

  1. "SmartMonitor"--an intelligent security system for the protection of individuals and small properties with the possibility of home automation.

    Science.gov (United States)

    Frejlichowski, Dariusz; Gościewska, Katarzyna; Forczmański, Paweł; Hofman, Radosław

    2014-06-05

    "SmartMonitor" is an intelligent security system based on image analysis that combines the advantages of alarm, video surveillance and home automation systems. The system is a complete solution that automatically reacts to every learned situation in a pre-specified way and has various applications, e.g., home and surrounding protection against unauthorized intrusion, crime detection or supervision over ill persons. The software is based on well-known and proven methods and algorithms for visual content analysis (VCA) that were appropriately modified and adopted to fit specific needs and create a video processing model which consists of foreground region detection and localization, candidate object extraction, object classification and tracking. In this paper, the "SmartMonitor" system is presented along with its architecture, employed methods and algorithms, and object analysis approach. Some experimental results on system operation are also provided. In the paper, focus is put on one of the aforementioned functionalities of the system, namely supervision over ill persons.

  2. Biluminescence via Fluorescence and Persistent Phosphorescence in Amorphous Organic Donor(D4)-Acceptor(A) Conjugates, and Application in Data Security Protection.

    Science.gov (United States)

    Bhatia, Harsh; Bhattacharjee, Indranil; Ray, Debdas

    2018-06-25

    Purely organic biluminescent materials are of great interest due to the involvement of both singlet and long-lived triplet emissions, which have been used in bio-imaging and organic light-emitting diodes. We show two molecules 3,4,5,6-tetraphenyloxy-phthlonitrile (POP) and 3,4,5,6-tetrakis-p-tolyloxy-phthalonitrile (TOP), in which POP was found to exhibit fluorescence and persistent room-temperature green phosphorescence (pRTGP) in the amorphous and crystal states. Both POP and TOP show aggregation induced emission in tetrahydrofuran-water mixture. We found in single crystal X-ray analysis that intra-and inter molecular lp(O)•••π interactions along with (π(C=C)•••π(C≡N), hydrogen bond (H-B), and C-H•••π interactions induce head-to-tail slipped-stacked arrangement in POP. In addition, X-ray structure of TOP with slipped-stack arrangement induced by only (π(C=C)•••π(C≡N) and H-B interactions, shows dim afterglow only in crystals. These indicate that more number of non-covalent interactions may reinforce relatively efficient inter system crossing that leads to pRTGP even in the amorphous state of POP. Given the unique green afterglow feature in amorphous state of POP, document security protection application is achievable.

  3. “SmartMonitor”— An Intelligent Security System for the Protection of Individuals and Small Properties with the Possibility of Home Automation

    Directory of Open Access Journals (Sweden)

    Dariusz Frejlichowski

    2014-06-01

    Full Text Available “SmartMonitor” is an intelligent security system based on image analysis that combines the advantages of alarm, video surveillance and home automation systems. The system is a complete solution that automatically reacts to every learned situation in a pre-specified way and has various applications, e.g., home and surrounding protection against unauthorized intrusion, crime detection or supervision over ill persons. The software is based on well-known and proven methods and algorithms for visual content analysis (VCA that were appropriately modified and adopted to fit specific needs and create a video processing model which consists of foreground region detection and localization, candidate object extraction, object classification and tracking. In this paper, the “SmartMonitor” system is presented along with its architecture, employed methods and algorithms, and object analysis approach. Some experimental results on system operation are also provided. In the paper, focus is put on one of the aforementioned functionalities of the system, namely supervision over ill persons.

  4. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  5. Guide to good practices for the selection, training, and qualification of shift technical advisors

    Energy Technology Data Exchange (ETDEWEB)

    1993-02-01

    The DOE Guide to Good Practices For The Selection, Training, and Qualification of Shift Technical Advisors can be used by any DOE nuclear facility that has implemented the shift technical advisor position. DOE Order 5480-20, ``Personnel Selection, Qualification, Training, and Staffing Requirements at DOE Reactor and Non-Reactor Nuclear Facilities,`` states that only Category A reactors must use shift technical advisor position. However, many DOE nuclear facilities have implemented the shift technical advisor position to provide independent on-shift technical advice and counsel to the shift operating personnel to help determine cause and mitigation of facility accidents. Those DOE nuclear facilities that have implemented or are going to implement the shift technical advisor position will find this guide useful. This guide addresses areas that may be covered by other training programs. In these cases, it is unnecessary (and undesirable) to duplicate these areas in the STA training program as long as the specific skills and knowledge essential for STAs are addressed. The guide is presented based on the premise that the trainee has not completed any facility-specific training other than general employee training.

  6. To Whistleblow or Not to Whistleblow: Affective and Cognitive Differences in Reporting Peers and Advisors.

    Science.gov (United States)

    McIntosh, Tristan; Higgs, Cory; Turner, Megan; Partlow, Paul; Steele, Logan; MacDougall, Alexandra E; Connelly, Shane; Mumford, Michael D

    2017-09-20

    Traditional whistleblowing theories have purported that whistleblowers engage in a rational process in determining whether or not to blow the whistle on misconduct. However, stressors inherent to whistleblowing often impede rational thinking and act as a barrier to effective whistleblowing. The negative impact of these stressors on whistleblowing may be made worse depending on who engages in the misconduct: a peer or advisor. In the present study, participants are presented with an ethical scenario where either a peer or advisor engages in misconduct, and positive and the negative consequences of whistleblowing are either directed to the wrongdoer, department, or university. Participant responses to case questions were evaluated for whistleblowing intentions, moral intensity, metacognitive reasoning strategies, and positive and negative, active and passive emotions. Findings indicate that participants were less likely to report the observed misconduct of an advisor compared to a peer. Furthermore, the findings also suggest that when an advisor is the source of misconduct, greater negative affect results. Post-hoc analyses were also conducted examining the differences between those who did and did not intend to blow the whistle under the circumstances of either having to report an advisor or peer. The implications of these findings for understanding the complexities involved in whistleblowing are discussed.

  7. LEGAL STATUS OF ADVISORS IN THE FIELD OF INTELLECTUAL PROPERTY RIGHT IN THE UNITED KINGDOM

    Directory of Open Access Journals (Sweden)

    Khrystyna Kmetyk

    2017-11-01

    Full Text Available Purpose: to research the legal status of advisors in the field of intellectual property right in the United Kingdom. In this article an author distinguishes and gives a legal description of the types of advisors in the field of intellectual property right in the United Kingdom. The main provisions of the Rules of Conduct for Patent Attorneys, Ttrade Mark Attorneys and Other Regulated Persons (2015 are considered. Methods: to analyse the legal status of advisors in the field of intellectual property right in the United Kingdom the method of induction, systematic approach, formal legal methods were used. Results: this research provides an opportunity to broaden the understanding of the institute of advisors in the field of intellectual property right (in particular patent attorneys and trademark attorneys in the UK and thus include this knowledge in domestic research on intellectual property right. Conclusions: the majority of types of advisors in the field of intellectual property right in the United Kingdom (patent attorneys, chartered patent attorneys, European patent attorneys, registered trademark attorneys and trademark attorneys, European trademark attorneys, etc. is well-educated professionals in all areas of intellectual property and are able to advise on a wide range of technical and commercial issues in this field. The obtained results will have a positive impact on the reform of the institute of representatives in the field of intellectual property in Ukraine in order to ensure its effectiveness and relevance to the challenges of the present.

  8. Viewpoints of students of Shahid Sadoughi University of Medical Sciences regarding their academic advisors

    Directory of Open Access Journals (Sweden)

    M.H Fallah Yakhdani

    2012-02-01

    Results: The majority of samples were from Nursing, Midwifery, and Public Health School and a few from Faculty of Medicine. The majority of students (41.8% agreed to have the same advisor from the first term to the last. Also the results showed that the functions of advisors were poor in the areas of constant supervision and monitoring of students’ educational status (35.8%, preparing the timetable for performing the personal or group counseling (41.8% and providing counseling sessions according to the timetable (42.3%. But their functions were fair in the areas of acceptable guidance of students in the educational problems (35.1%, and the advisor’s familiarity to educational regulations (43.9%. It is necessary to note that the advisor's ability in making the intimate relationship with students (37.1%, and the advisors’ motivation and tendency to guidance and counseling (30.1% were the two items evaluated excellent by students. Conclusion: It is necessary that advisors make the students familiar with educational regulations at the first semester of higher education. Also, the policies and regulations for advisors will clarify their activities and will help them to perform better.

  9. Women and social security

    NARCIS (Netherlands)

    Westerveld, M.; Pennings, F.; Vonk, G.

    2015-01-01

    Does ‘the’ social security take sufficient account of women? Are its protection schemes sufficiently aimed at safeguarding women’s interests? These are the questions I was invited to answer for this handbook on social security law. At the same time I was asked to adopt an unorthodox approach, one

  10. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  11. Groundwater Protection Program Management Plan For The U.S. Department Of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental, LLC

    2009-09-01

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of Babcock & Wilcox Technical Services Y-12 LLC (hereafter referenced as B&W Y-12), the Y-12 management and operations (M&O) contractor for DOE. B&W Y-12 is a new corporate name, assumed in January 2007, for the company formerly known as BWXT Y-12, L.L.C., hereafter referenced as BWXT. This GWPP management plan addresses the requirements of DOE Order 450.1A Environmental Protection Program (hereafter referenced as DOE O 450.1A), which emphasize a site-wide approach for groundwater protection at each DOE facility through implementation of groundwater surveillance monitoring. Additionally, this plan addresses the relevant and applicable GWPP elements and goals described in the DOE O 450.1A technical guidance documents issued in June 2004 (DOE 2004) and May 2005 (DOE 2005). This GWPP management plan is a 'living' document that is reviewed annually, revised and reissued every three years, and is formatted to provide for updating individual sections independent of the rest of the document. Section 2 includes a short description of the groundwater system at Y-12, the history of groundwater monitoring at Y-12 and the corresponding evolution of the GWPP

  12. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  13. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  14. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  15. Process Security in Chemical Engineering Education

    Science.gov (United States)

    Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.

    2005-01-01

    The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…

  16. 2001 Joint ADVISOR/PSAT Vehicle Systems Modeling User's Conference Proceedings (CD)

    International Nuclear Information System (INIS)

    Markel, T.

    2001-01-01

    The 2001 Joint ADVISOR/PSAT Vehicle Systems Modeling User Conference provided an opportunity for engineers in the automotive industry and the research environment to share their experiences in vehicle systems modeling using ADVISOR and PSAT. ADVISOR and PSAT are vehicle systems modeling tools developed and supported by the National Renewable Energy Laboratory and Argonne National Laboratory respectively with the financial support of the US Department of Energy. During this conference peers presented the results of studies using the simulation tools and improvements that they have made or would like to see in the simulation tools. Focus areas of the presentations included Control Strategy, Model Validation, Optimization and Co-Simulation, Model Development, Applications, and Fuel Cell Vehicle Systems Analysis. Attendees were offered the opportunity to give feedback on future model development plans

  17. The figure of the helper advisor in cases of sexual abuse against people with intellectual disabilities

    Directory of Open Access Journals (Sweden)

    Almudena MARTORELL CAFRANGA

    2017-09-01

    Full Text Available In this paper we analyse the main barriers that people with intellectual disabilities who have suffered sexual abuse have to face when they access the Justice system. Regarding these barriers, the Victim Support Unit for People with Intellectual Disabilities of the Fundación Carmen Pardo-Valcarce proposes the inclusion in the judicial process of a helper advisor. The entry into force in 2015 of the Law 4/2015, in 27 April, the Statute of the crime victim represents an exemplary opportunity to ensure the incorporation of support proposals involving the insertion of the helper advisor in the judicial process in cases where the victim is a person with intellectual disabilities. In this paper we analyse the impact of the helper advisor, with particular emphasis on cases that have been dismissed under instruction.

  18. 2001 Joint ADVISOR/PSAT Vehicle Systems Modeling User's Conference Proceedings (CD)

    Energy Technology Data Exchange (ETDEWEB)

    Markel, T.

    2001-08-01

    The 2001 Joint ADVISOR/PSAT Vehicle Systems Modeling User Conference provided an opportunity for engineers in the automotive industry and the research environment to share their experiences in vehicle systems modeling using ADVISOR and PSAT. ADVISOR and PSAT are vehicle systems modeling tools developed and supported by the National Renewable Energy Laboratory and Argonne National Laboratory respectively with the financial support of the US Department of Energy. During this conference peers presented the results of studies using the simulation tools and improvements that they have made or would like to see in the simulation tools. Focus areas of the presentations included Control Strategy, Model Validation, Optimization and Co-Simulation, Model Development, Applications, and Fuel Cell Vehicle Systems Analysis. Attendees were offered the opportunity to give feedback on future model development plans.

  19. How Data Mining Threatens Student Privacy. Joint Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives Serial No. 113-76 and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce, House of Representatives Serial No. 113-61, House of Representatives, One Hundred Thirteenth Congress, Second Session (June 25, 2014)

    Science.gov (United States)

    US House of Representatives, 2015

    2015-01-01

    This paper presents the first joint hearing of the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce. The subcommittees met to examine data collection…

  20. Protection of National Security Information

    National Research Council Canada - National Science Library

    Elsea, Jennifer K

    2006-01-01

    Recent cases involving alleged disclosures of classified information to the news media or others who are not entitled to receive it have renewed Congress s interest with regard to the possible need...

  1. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  2. Beginning ASPNET Security

    CERN Document Server

    Dorrans, Barry

    2010-01-01

    Beginning ASP.NET 3.5 Security is geared for novice to intermediate ASP.NET programmers who wish to protect and defend their web sites against attack and exploitation. Beginning with a discussion of why we need security and the things that may occur when it is ignored and an overview of how ASP.NET works, readers are taken through the common steps in developing a web site, the security problems each area exposes and how these can be exploited. Visual Studio Security MVP Barry Dorrans teaches readers how they can defend their applications using the standard .NET framework, industry patterns and

  3. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  4. Securing a better future for all: Nuclear techniques for global development and environmental protection. NA factsheet on food and agriculture: Building better agriculture one atom at a time

    International Nuclear Information System (INIS)

    2012-01-01

    In a world facing the dilemmas posed by exponential population growth and changing climates, nuclear technology offers possible avenues to solve production problems, protect soil and water resources and conserve biodiversity, which, in turn, means increased hope for global food security. Application of nuclear technology has a proven record in increasing agricultural production. Higher and more reliable yields not only improve farmers' livelihoods, they mean better quality and safer food for consumers. The methods used vary: isotope measurements identify and trace the efficiency of crop inputs such as water and fertilizer and of animal feeds; gamma rays sterillize male insects so that when they are returned to the wild they are unable to produce progeny; irradiation stops the growth of pests and expands the shelf life of grains, spices and processed foods; radiation induced mutation speeds up natural genetic changes in crops to support plant breeders; and genetic markers expedite the identification of animal diseases thereby allowing treatment to begin sooner. All of these methods, plus a host of others that come under the heading of nuclear technology, are invaluable tools for agriculture and food production. For almost five decades, the IAEA, together with its partner the FAO, guided development of new nuclear based methodologies, requested by its Member States and facilitated their adaptation, adoption and application. A harbinger of the United Nation's Delivering as One, the Joint FAO/IAEA Division stands as the United Nations' system's only joint venture. It also operates its own agriculture and biotechnology laboratories in Seibersdorf where technical services, R and D and laboratory training activities are conducted in support of the development and transfer of new technologies and their adaptation to local needs and environments.

  5. Protection of drinking water reservoirs in buried glacial valleys in the ice-marginal landscape for securing future demand in the European perspective (ENCORE-Project).

    Science.gov (United States)

    Smit, F. W. H.; Bregman, E. P. H.

    2012-04-01

    Quaternary glaciations have left a significant sedimentological fingerprint in the subsurface of north Europe, in the form of buried glacial valleys. These structures are important drinking water reservoirs for millions of people in the ice-marginal landscape, but are increasingly threatened by anthropogenic pollution (nitrate, sulphate and organic pollutants) and geogenic pollution (salinization). That is one of the conclusion of a recent overview study in the IML of northern Europe from the North Sea to the southern Baltic area. Adequate policy making is yet not possible for several reasons: - Large amounts of data are needed to get a good grip on the lateral continuity of the complex infill. - The BurVal Working Group (2006) has shown that a combination of high resolution seismic survey, together with transient electromagnetic (TEM) surveys can provide realistic data for 3D hydrogeological models. However, these data have not yet been retrieved on a European scale. - Available borehole data can only be used as control points in 3D hydrological models, since the infill of buried glacial valleys is often lateral too complex to make sound interpolations possible. Pollution in buried glacial valleys crosses national borders in northern Europe and therefore national geological surveys have to cooperate in a newly formed European project on protection of these structures. The ENCORE - project (Environmental Conference of the European Regions) has shown in the past that it can facilitate fruitful European cooperation, which is urgently needed due to the costs of gathering data and due to knowledge gaps between different countries. By working together in a European context, these problems can be reduced so that better policy making is possible in order to secure our future drinking water availability.

  6. Contextualizing Gay-straight Alliances: Student, Advisor, and Structural Factors Related to Positive Youth Development among Members

    Science.gov (United States)

    Poteat, V. Paul; Yoshikawa, Hirokazu; Calzo, Jerel P.; Gray, Mary L.; DiGiovanni, Craig D.; Lipkin, Arthur; Mundy-Shephard, Adrienne; Perrotti, Jeff; Scheer, Jillian R.; Shaw, Matthew P.

    2015-01-01

    Gay-straight alliances (GSAs) may promote resilience. Yet, what GSA components predict well-being? Among 146 youth and advisors in 13 GSAs (58% lesbian, gay, bisexual, or questioning; 64% White; 38% received free/reduced-cost lunch), student (demographics, victimization, attendance frequency, leadership, support, control), advisor (years served,…

  7. United States Security Assistance 1977-1980: Human Rights Issues Affecting Arms Transfers.

    Science.gov (United States)

    1995-09-01

    police attempted to break up the gathering, the crowd became enraged and proceeded to destroy a number of banks, cinemas , and hotels (Brown:296...According to Carter’s National Security Advisor, Zbigniew Brzezinski, the Peruvian government released over 300 prisoners in April 1977; "disappearances

  8. 75 FR 79061 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Science.gov (United States)

    2010-12-17

    ... securities advisors--the Commission seeks comment on whether the proposed structure of the MSRB Nominating... membership on the Board, in order to establish a Nominating Committee in compliance with MSRB transitional... appropriate prior to the creation of the Nominating Committee of the MSRB (hereinafter, ``Nominating and...

  9. 78 FR 44607 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of a...

    Science.gov (United States)

    2013-07-24

    ... (collectively ``regulated entities''). It is governed by a 21- member board composed of eleven independent... directors in overseeing the municipal securities market, it is imperative that the board identify candidates... non- dealer municipal advisors. The public representatives must be independent of any regulated entity...

  10. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  11. Water security evaluation in Yellow River basin

    Science.gov (United States)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  12. 76 FR 67755 - Privacy Act of 1974; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP...

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0102] Privacy Act of... Data System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to...

  13. The 2012 Recommendation concerning national floors of social protection (No. 202) : The human rights approach to social security in ILO wrapping paper

    NARCIS (Netherlands)

    Vonk, Gijsbert

    2013-01-01

    The International Labour Organisation (ILO) has a long tradition of developing minimum social security standards. However, the value of these instruments is increasingly criticised. A central point in this criticism is that the standards are not based upon the notion of a right to social security

  14. Company's Data Security - Case Study

    Science.gov (United States)

    Stera, Piotr

    This paper describes a computer network and data security problems in an existing company. Two main issues were pointed out: data loss protection and uncontrolled data copying. Security system was designed and implemented. The system consists of many dedicated programs. This system protect from data loss and detected unauthorized file copying from company's server by a dishonest employee.

  15. How do incentives lead to deception in advisor-client interactions? Explicit and implicit strategies of self-interested deception.

    Science.gov (United States)

    Mackinger, Barbara; Jonas, Eva

    2012-01-01

    When confronted with important questions we like to rely on the advice of experts. However, uncertainty can occur regarding advisors' motivation to pursue self-interest and deceive the client. This can especially occur when the advisor has the possibility to receive an incentive by recommending a certain alternative. We investigated how the possibility to pursue self-interest led to explicit strategic behavior (bias in recommendation and transfer of information) and to implicit strategic behavior (bias in information processing: evaluation and memory). In Study 1 explicit strategic behavior could be identified: self-interested advisors recommended more often the self-serving alternative and transferred more self-interested biased information to their client compared to the advisor without specific interest. Also deception through implicit strategic behavior was identified: self-interested advisors biased the evaluation of information less in favor of the client compared to the control group. Self-interested advisors also remembered conflicting information regarding their self-interest worse compared to advisors without self-interest. In Study 2 beside self-interest we assessed accountability which interacted with self-interest and increased the bias: when accountability was high advisor's self-interest led to higher explicit strategic behavior (less transfer of conflicting information), and to higher implicit strategic behavior (devaluated and remembered less conflicting information). Both studies identified implicit strategic behavior as mediator which can explain the relation between self-interest and explicit strategic behavior. Results of both studies suggest that self-interested advisors use explicit and implicit strategic behavior to receive an incentive. Thus, advisors do not only consciously inform their clients "self-interested," but they are influenced unconsciously by biased information processing - a tendency which even increased with high

  16. Personal finance: there are no shortcuts to financial security.

    Science.gov (United States)

    Yarkony, Kathryn

    2009-12-01

    Perioperative nurses have skills that lend themselves to sound financial decision-making, and during these difficult economic times, it is important to know how to secure earnings for the future. Key strategies include saving for retirement, consulting a financial advisor, investing in reliable vehicles, holding investments until the market stabilizes, and controlling credit card debt. Nurses can use the nursing process of assessment, diagnosis, planning, implementation, and evaluation to help them make sound financial decisions. (c) AORN, Inc, 2009.

  17. A Strategy for American Power: Energy, Climate and National Security

    Science.gov (United States)

    2008-06-01

    For example, Greg Mankiw , Harvard economist and former chair of President Bush’s Council of Economic Advisors, has proposed phasing in a $1 per...International Energy Barrier By Amy Myers Jaffe 77 Chapter V: Overcoming the Economic Barriers to Climate Change and Energy Security By Jason Furman (lead...Hamilton Project. He previously served in the Clinton administration and at the Council of Economic Advisers, the National Economic Council, and the World

  18. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  19. Protecting the source. Securing nuclear material and strong radiation sources. New threats of terrorism are prompting the need for swift action to better secure nuclear material and strong radiation sources. Are measures already in place enough? The Stanford-Salzburg initiative suggests not

    International Nuclear Information System (INIS)

    Steinhausler, F.; Bunn, G.

    2003-01-01

    At a time of growing concern over threats of terrorism, the security of nuclear and radioactive material is an urgent and serious issue. Working with a range of partners, the IAEA has put into place a multi-faceted Action Plan to help countries upgrade their capabilities. But more needs to be done to counter new types of threats. One particular area that needs to be strengthened is the physical protection of nuclear and radioactive material. The attacks of 11 September 2001 opened our eyes to i he urgent need to strengthen national physical protection (PP) practices for nuclear and other radioactive material. The principle that highly radioactive material will protect itself does not apply to the newest generation of terrorists. Existing PP systems were not designed to deal with the threat of suicidal terrorists commanding the numbers, skills, training, and resources available to those who carried out the attacks in the US. Moreover, because there are no mandatory international standards for domestic PP systems for nuclear or radioactive material, protection measures vary greatly from country to country. The IAEA recommended standards (Inference/225/Rev. 4) were not designed with the new terrorist threats in mind and national practices often fall short of even these recommendations. The result is inadequate protection against the new form of terrorism. Few argue the point that national physical protection practices for nuclear and other radioactive material need to be strengthened. This article summarizes a Stanford-Salzburg plan developed by experts from Stanford University's Center for International Security and Cooperation, (USA) and revised at the EU-Physical Protection NUMAT Conference in September 2002 in Salzburg, Austria. It includes six recommended elements to consider in addition to what the IAEA is now doing to improve PP practices around the world: Establish a global list of physical protection priorities; Create a multilateral security cooperation

  20. Surviving security how to integrate people, process, and technology

    CERN Document Server

    Andress, Amanda

    2003-01-01

    WHY DO I NEED SECURITY? Introduction The Importance of an Effective Security Infrastructure People, Process, and Technology What Are You Protecting Against? Types of Attacks Types of Attackers Security as a Competitive Advantage Choosing a Solution Finding Security Employees The Layered Approach UNDERSTANDING REQUIREMENTS AND RISK What Is Risk? Embracing Risk Information Security Risk Assessment Assessing Risk Insurance SECURITY POLICIES AND PROCEDURES Internal Focus Is Key Security Awareness and Education Policy Life Cycle Developing Policies Components of a Security Policy Sample Security Po

  1. Ties That Bind: Academic Advisors as Agents of Student Relationship Management

    Science.gov (United States)

    Vianden, Jörg

    2016-01-01

    To affect college retention, academic advisors should act as agents of student relationship management by strengthening the connection between students and their institutions. Satisfaction and dissatisfaction with academic advising as perceived by 29 college students at 3 midwestern comprehensive institutions are described. Discussion is framed in…

  2. Exploring Inner Speech as a Psycho-Educational Resource for Language Learning Advisors

    Science.gov (United States)

    McCarthy, Tanya M.

    2018-01-01

    The analysis of advising sessions has recognized common standards of the profession in areas such as advising skills employed and non-verbal communicative practices. There are however numerous variations in advisor behavior due to differences in cognitive processes. This study used a stimulated recall approach to identify the content of inner…

  3. 77 FR 10736 - President's Council of Advisors on Science and Technology (PCAST)

    Science.gov (United States)

    2012-02-23

    ... an overview of the Department of Agriculture's science, technology, and innovation activities, and... DEPARTMENT OF ENERGY President's Council of Advisors on Science and Technology (PCAST) AGENCY... Science and Technology (PCAST), and describes the functions of the Council. Notice of this meeting is...

  4. Teachers Providing Social and Emotional Support: A Study of Advisor Role Enactment in Small High Schools

    Science.gov (United States)

    Phillippo, Kate L.

    2010-01-01

    Background/Context: This study investigates the teacher's role in the student advisory process, which to date has generated limited research literature. Teachers who serve as student advisors assume a role that extends beyond the more traditional instructional role, and includes implied or explicit expectations to provide student advisees with…

  5. 77 FR 65593 - PNC Capital Advisors, LLC, et al.; Notice of Application

    Science.gov (United States)

    2012-10-29

    ... registered open-end management investment companies that operate as ``funds of funds'' to acquire shares of.... Applicants: PNC Capital Advisors, LLC (``Adviser'') and PNC Funds and PNC Advantage Funds (each a ``Trust... statutory trust. Each Trust is comprised of separate series that pursue distinct investment objectives and...

  6. The Moderating Effect of Personality Traits on Advisor Relationships in Predicting Doctoral Student Burnout

    Science.gov (United States)

    Kosh, Emily P.

    2014-01-01

    Personality affects relationships. During the doctoral education, the second most important factor in degree completion, after financial support, is the student-advisor relationship. Approximately half of doctoral students do not finish their degrees. While it is known mentors have a profound impact on the success of doctoral students, the effect…

  7. Aspects Fostering the Programming of Today's College Radio Station: The Advisor's Perspective.

    Science.gov (United States)

    Sauls, Samuel J.

    To help ascertain leadership, guidance, and capabilities of the station advisor (those who foster the efforts of their student staffs), this paper provides an overview of programming elements discussing such topics as programming philosophy, general formats, and legal and ethical issues. It states that those advising the campus radio station can…

  8. Installation and evaluation of a nuclear power plant operator advisor based on artificial intelligence technology

    International Nuclear Information System (INIS)

    Hajek, B.K.; Miller, D.W.

    1989-01-01

    This report discusses the following topics on a Nuclear Power Plant operator advisor based on artificial Intelligence Technology; Workstation conversion; Software Conversion; V ampersand V Program Development Development; Simulator Interface Development; Knowledge Base Expansion; Dynamic Testing; Database Conversion; Installation at the Perry Simulator; Evaluation of Operator Interaction; Design of Man-Machine Interface; and Design of Maintenance Facility

  9. Graduate Students' Perceptions of Their Advisors: Is There Systematic Disadvantage in Mentorship?

    Science.gov (United States)

    Noy, Shiri; Ray, Rashawn

    2012-01-01

    We explore how race and gender shape graduate students' perceptions of their advisors. We find evidence that women of color and students in the biological/physical sciences report significantly less support than other groups. Our findings speak to the utility of the intersectionality framework for examining interpersonal relations in higher…

  10. Architects, Captains, and Dreamers: Creating Advisor Roles that Foster Youth-Adult Partnerships

    Science.gov (United States)

    Mitra, Dana; Lewis, Tiffanie; Sanders, Felicia

    2013-01-01

    While research has documented the many ways in which student voice can enable educational change, the process of how adults can help to enable student voice is less clear. This article examines how adults new to working as advisors of student voice initiatives begin to develop partnerships with young people. Using a Youth-Adult Partnership…

  11. The treatment implementation advisor: a component of the GypsES project

    Science.gov (United States)

    Michael C. Saunders; Michael A. Foster

    1991-01-01

    The treatment implementation advisor is one of the knowledge based advisory modules of GypsES, a knowledge system environment for decision support in gypsy moth management. Its function is to provide detailed advice on intervention tactics for gypsy moth: e.g. aerial and ground application of insecticides and microbials, inundative or augmentative releases of...

  12. Bioenergy, Land Use Change and Climate Change Mitigation. Report for Policy Advisors and Policy Makers

    Energy Technology Data Exchange (ETDEWEB)

    Berndes, Goran [Chalmers Univ. of Technology (Sweden); Bird, Nell [Joanneum Research (Austria); Cowle, Annette [National Centre for Rural Greenhouse Gas Research (Australia)

    2010-07-01

    The report addresses a much debated issue - bioenergy and associated land use change, and how the climate change mitigation from use of bioenergy can be influenced by greenhouse gas emissions arising from land use change. The purpose of the report was to produce an unbiased, authoritative statement on this topic aimed especially at policy advisors and policy makers.

  13. 76 FR 70779 - President's Council of Advisors on Science and Technology

    Science.gov (United States)

    2011-11-15

    ... University of Michigan North Campus Research Complex, 2800 Plymouth Road, Building 18, Ann Arbor, MI 48109... the University of Michigan North Research Complex from 8:30 a.m. to 2:45 p.m. on December 12, 2011... OFFICE OF SCIENCE AND TECHNOLOGY POLICY President's Council of Advisors on Science and Technology...

  14. The Advisor as Servant: The Theoretical and Philosophical Relevance of Servant Leadership to Academic Advising

    Science.gov (United States)

    McClellan, Jeffrey L.

    2007-01-01

    Servant. This novel actively portrays Greenleaf's concept of servant leadership by describing the extracurricular work of a university professor. Consequently, some scholars have demonstrated the relevance of servant leadership to classroom instruction (Powers & Moore, 2005). However, it was not as an instructor, but as an advisor that the…

  15. Elaboration et Suivi des Budgets de Marketing Industriel: le Système ADVISOR

    OpenAIRE

    Choffray, Jean-Marie; Delabre, Gilles

    1982-01-01

    Cet article revoit les problèmes posés par l'élaboration et le suivi des budgets de marketing dans un environnement industriel. Il présente le système ADVISOR pour lequel nous avons développé un programme interactif adapté aux besoins des entreprises Françaises.

  16. Dissemination of colorectal cancer screening by Filipino American community health advisors: a feasibility study.

    Science.gov (United States)

    Maxwell, Annette E; Danao, Leda L; Bastani, Roshan

    2013-07-01

    Filipino Americans underutilize life-saving screening tests for colorectal cancer, resulting in late stage of diagnosis and poor survival relative to other racial/ethnic groups. Education regarding colorectal cancer screening and distribution of free fecal occult blood test (FOBT) kits are evidence-based interventions that can significantly increase screening. However, this community will only benefit if the intervention is broadly disseminated. We assessed the feasibility of promoting colorectal cancer screening in Filipino American community settings working with community health advisors, and the practicality of conducting one-on-one or small group education, in addition to passing out free FOBT kits. Twenty community health advisors from 4 organizations engaged in recruitment and education activities with 132 participants. Community health advisors consistently completed screening questionnaires to establish eligibility and kept logs of FOBT distribution. However, they did not consistently record eligible participants who did not consent to participate. Process checklists that indicated what information was covered in each educational session and postsession follow-up logs were partially completed. Almost all participants reported receipt of intervention components and receipt of screening at 4-month follow-up and reported high acceptability of the program. The pilot study established the feasibility of working with community health advisors to promote colorectal cancer screening in Filipino American community settings. Findings informed the design of a dissemination trial that is currently ongoing with regards to monitoring recruitment, intervention implementation and follow-up and allowing flexibility regarding one-on-one or small group education.

  17. Demographic Trends and Advocacy Experiences of Gay-Straight Alliance Advisors

    Science.gov (United States)

    Graybill, Emily C.; Varjas, Kris; Meyers, Joel; Dever, Bridget V.; Greenberg, Daphne; Roach, Andrew T.; Morillas, Catalina

    2015-01-01

    Using an ecological model, the individual-, school-, and sociocultural-level characteristics that affect gay-straight alliance (GSA) advisors were examined in the current study. The formation of GSAs has been one way that schools have sought to improve the school climate for lesbian, gay, bisexual, and transgender (LGBT) youth. Limited information…

  18. Culturally Competent Training Program: A Key to Training Lay Health Advisors for Promoting Breast Cancer Screening

    Science.gov (United States)

    Yu, Mei-yu; Song, Lixin; Seetoo, Amy; Cai, Cuijuan; Smith, Gary; Oakley, Deborah

    2007-01-01

    The lay health advisor (LHA) training program for breast cancer screening was conducted among Chinese-English bilingual trainees residing in Southeast Michigan. Guided by Bandura's Social Learning Theory, the development of the training curriculum followed the health communication process recommended by the National Cancer Institute. Data analysis…

  19. Student goal orientation in learning inquiry skills with modifiable software advisors

    Science.gov (United States)

    Shimoda, Todd Adrian

    A computer support environment (SCI-WISE) for learning and doing inquiry was designed. The system incorporates software advisors that give task completion advice (eg., forming hypotheses), general purpose advice (e.g., brainstorming), or system modification advice. Advisors' knowledge includes concepts, strategies, examples, referrals to other advisors, and criteria for evaluating good products and skills. Students using SCI-WISE can select the advisors' advice type (specific, general, or hints), and when advisors give advice (anytime, alert, or ask). Students can also modify the advisors' knowledge. The system is designed partly on a theoretical framework that assumes giving students higher levels of agency will facilitate higher-level goal orientation (such as knowledge-building) and produce higher levels of competence. In two studies of sixth graders, science students took a pretest of an open-ended inquiry question and a questionnaire that measured their goal orientations. The students worked in pairs on an inquiry project about memory, using one of two versions of SCI-WISE, one modifiable and one not modifiable. After finishing the project, the students took a posttest similar to the pretest, and evaluated the system. The main hypotheses predicted that knowledge-oriented students using the modifiable version would rate the system higher, use it more effectively, and do better on the inquiry posttest than task-oriented students. The results supported many of the hypotheses generated from the theoretical framework. Knowledge-oriented students tended to rate SCI-WISE higher, use more general purpose and system development advisors, and select more general advice and hints than task-oriented students. On the posttest inquiry test, students with higher goal orientations scored higher on average, particularly when paired with another knowledge oriented student. The studies also showed that goal orientation was not correlated with grade point average. Finally, the

  20. A view from the UK III: radiation protection in Europe - medical issues

    Energy Technology Data Exchange (ETDEWEB)

    Corbett, R.H.; Faulkner, K. [Freeman Hospital, Newcastle-upon-Tyne (United Kingdom). Dept. of Medical Physics

    1997-12-31

    Perhaps the major problem in the medical world is one of communication. While there is a clear chain of information dissemination in management circles, radiation protection is a Cinderella subject by comparison. There will be an important role for Radiation Protection Advisors (RPAs) and Radiation Protection Supervisors (RPSs) to interpret and review the new standards and apply them within their departments. (orig.)